Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
Resource
win10v2004-20220812-en
General
-
Target
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe
-
Size
72KB
-
MD5
9cb946578645e32db35a5fc5b35ec5a4
-
SHA1
54c309208c6cdb670e34c0b06f80facf57214d07
-
SHA256
39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a
-
SHA512
667a0666a0ba962b40a16e7482dde4090b77700c85623a57da49074ff455c9112ddc3976e3863005a4dc5798f0c885bde3492516b9cc604a8b11c8550b8cbe68
-
SSDEEP
384:TA6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGfM:EpQNwC3BEddsEqOt/hyJF+x3BEJwRrh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 39 IoCs
pid Process 3664 backup.exe 968 backup.exe 4464 backup.exe 2852 backup.exe 812 backup.exe 4148 backup.exe 1576 backup.exe 1388 backup.exe 4080 backup.exe 2652 backup.exe 3528 backup.exe 2032 System Restore.exe 4760 backup.exe 4380 backup.exe 4628 data.exe 1660 backup.exe 2344 backup.exe 2248 backup.exe 4196 backup.exe 332 backup.exe 3756 data.exe 4580 backup.exe 1852 backup.exe 2340 backup.exe 384 backup.exe 3804 backup.exe 3740 backup.exe 1204 backup.exe 4472 backup.exe 3020 System Restore.exe 1676 backup.exe 4188 backup.exe 4660 backup.exe 4316 backup.exe 2532 backup.exe 4020 backup.exe 728 backup.exe 4644 System Restore.exe 3264 backup.exe -
Drops file in Program Files directory 29 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\DESIGNER\data.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fi-FI\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 3664 backup.exe 968 backup.exe 4464 backup.exe 2852 backup.exe 812 backup.exe 4148 backup.exe 1576 backup.exe 1388 backup.exe 4080 backup.exe 2652 backup.exe 3528 backup.exe 2032 System Restore.exe 4760 backup.exe 4380 backup.exe 4628 data.exe 1660 backup.exe 2344 backup.exe 2248 backup.exe 4196 backup.exe 332 backup.exe 3756 data.exe 4580 backup.exe 1852 backup.exe 2340 backup.exe 384 backup.exe 3804 backup.exe 3740 backup.exe 1204 backup.exe 4472 backup.exe 3020 System Restore.exe 1676 backup.exe 4188 backup.exe 4660 backup.exe 4316 backup.exe 2532 backup.exe 4644 System Restore.exe 728 backup.exe 4020 backup.exe 3264 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3664 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 81 PID 4764 wrote to memory of 3664 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 81 PID 4764 wrote to memory of 3664 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 81 PID 4764 wrote to memory of 968 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 82 PID 4764 wrote to memory of 968 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 82 PID 4764 wrote to memory of 968 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 82 PID 4764 wrote to memory of 4464 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 83 PID 4764 wrote to memory of 4464 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 83 PID 4764 wrote to memory of 4464 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 83 PID 4764 wrote to memory of 2852 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 84 PID 4764 wrote to memory of 2852 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 84 PID 4764 wrote to memory of 2852 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 84 PID 4764 wrote to memory of 812 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 85 PID 4764 wrote to memory of 812 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 85 PID 4764 wrote to memory of 812 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 85 PID 4764 wrote to memory of 4148 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 86 PID 4764 wrote to memory of 4148 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 86 PID 4764 wrote to memory of 4148 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 86 PID 4764 wrote to memory of 1576 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 87 PID 4764 wrote to memory of 1576 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 87 PID 4764 wrote to memory of 1576 4764 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe 87 PID 3664 wrote to memory of 1388 3664 backup.exe 88 PID 3664 wrote to memory of 1388 3664 backup.exe 88 PID 3664 wrote to memory of 1388 3664 backup.exe 88 PID 1388 wrote to memory of 4080 1388 backup.exe 89 PID 1388 wrote to memory of 4080 1388 backup.exe 89 PID 1388 wrote to memory of 4080 1388 backup.exe 89 PID 1388 wrote to memory of 2652 1388 backup.exe 90 PID 1388 wrote to memory of 2652 1388 backup.exe 90 PID 1388 wrote to memory of 2652 1388 backup.exe 90 PID 1388 wrote to memory of 3528 1388 backup.exe 91 PID 1388 wrote to memory of 3528 1388 backup.exe 91 PID 1388 wrote to memory of 3528 1388 backup.exe 91 PID 3528 wrote to memory of 2032 3528 backup.exe 92 PID 3528 wrote to memory of 2032 3528 backup.exe 92 PID 3528 wrote to memory of 2032 3528 backup.exe 92 PID 2032 wrote to memory of 4760 2032 System Restore.exe 93 PID 2032 wrote to memory of 4760 2032 System Restore.exe 93 PID 2032 wrote to memory of 4760 2032 System Restore.exe 93 PID 3528 wrote to memory of 4380 3528 backup.exe 94 PID 3528 wrote to memory of 4380 3528 backup.exe 94 PID 3528 wrote to memory of 4380 3528 backup.exe 94 PID 4380 wrote to memory of 4628 4380 backup.exe 95 PID 4380 wrote to memory of 4628 4380 backup.exe 95 PID 4380 wrote to memory of 4628 4380 backup.exe 95 PID 4380 wrote to memory of 1660 4380 backup.exe 96 PID 4380 wrote to memory of 1660 4380 backup.exe 96 PID 4380 wrote to memory of 1660 4380 backup.exe 96 PID 1660 wrote to memory of 2344 1660 backup.exe 97 PID 1660 wrote to memory of 2344 1660 backup.exe 97 PID 1660 wrote to memory of 2344 1660 backup.exe 97 PID 1660 wrote to memory of 2248 1660 backup.exe 98 PID 1660 wrote to memory of 2248 1660 backup.exe 98 PID 1660 wrote to memory of 2248 1660 backup.exe 98 PID 2248 wrote to memory of 4196 2248 backup.exe 99 PID 2248 wrote to memory of 4196 2248 backup.exe 99 PID 2248 wrote to memory of 4196 2248 backup.exe 99 PID 2248 wrote to memory of 332 2248 backup.exe 100 PID 2248 wrote to memory of 332 2248 backup.exe 100 PID 2248 wrote to memory of 332 2248 backup.exe 100 PID 2248 wrote to memory of 3756 2248 backup.exe 101 PID 2248 wrote to memory of 3756 2248 backup.exe 101 PID 2248 wrote to memory of 3756 2248 backup.exe 101 PID 2248 wrote to memory of 4580 2248 backup.exe 102 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe"C:\Users\Admin\AppData\Local\Temp\39da27dab2fcebbba687e8278aa10a4cb0a66378e6aa633feff2b273d952c52a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\729164602\backup.exeC:\Users\Admin\AppData\Local\Temp\729164602\backup.exe C:\Users\Admin\AppData\Local\Temp\729164602\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3664 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1388 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4080
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2652
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3528 -
C:\Program Files\7-Zip\System Restore.exe"C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2032 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4760
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Common Files\DESIGNER\data.exe"C:\Program Files\Common Files\DESIGNER\data.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4628
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1660 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2344
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2248 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4196
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:332
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\data.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\data.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3756
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4580
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1852
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2340
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:384
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3804
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3740
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4472
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3020
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1676
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4188
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4660 -
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4316
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2532
-
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3264
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:728
-
-
-
C:\Program Files (x86)\System Restore.exe"C:\Program Files (x86)\System Restore.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:812
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4148
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD50384653cb7b14c37b2843c84fbbb2abf
SHA1f0282e6db4c9b3413d9d5ed1c318e5e5f7e96656
SHA25612f830e8c7896c3950d38b800bf00e712874cca358fdd050122408d428ae993b
SHA51282d39ed8c4aec78267b47b667a46e4690145ff72b0d4cf2a4f8349e5d23a3e44901f1b8055407b3a2678b2d4eb5d2a115ce8f24aa9675d5e70a0ceb6ad45ca7f
-
Filesize
72KB
MD50384653cb7b14c37b2843c84fbbb2abf
SHA1f0282e6db4c9b3413d9d5ed1c318e5e5f7e96656
SHA25612f830e8c7896c3950d38b800bf00e712874cca358fdd050122408d428ae993b
SHA51282d39ed8c4aec78267b47b667a46e4690145ff72b0d4cf2a4f8349e5d23a3e44901f1b8055407b3a2678b2d4eb5d2a115ce8f24aa9675d5e70a0ceb6ad45ca7f
-
Filesize
72KB
MD510780dcc122ccc668fee1c8d81651c8c
SHA163fe39afe049a7e8cac4975d82d5a6ba7a0cd6c6
SHA2560ca94a57346fe70fc731510125027ec24bf3c0fbbd1227c98b3dd6f0bf894b3d
SHA5120e8fc819bbb9bf5cc7291eae1ddfbd84870b68499e031f447548b507ccc59f5599b7c1bd0703b9cb6525cf1b1950472539acf27f140b8f6637d25adf4bc12a7a
-
Filesize
72KB
MD510780dcc122ccc668fee1c8d81651c8c
SHA163fe39afe049a7e8cac4975d82d5a6ba7a0cd6c6
SHA2560ca94a57346fe70fc731510125027ec24bf3c0fbbd1227c98b3dd6f0bf894b3d
SHA5120e8fc819bbb9bf5cc7291eae1ddfbd84870b68499e031f447548b507ccc59f5599b7c1bd0703b9cb6525cf1b1950472539acf27f140b8f6637d25adf4bc12a7a
-
Filesize
72KB
MD5c6707543e593772747e5e8499482e98f
SHA16fad5adeb71f1b610d3d99e72120369db397ca3f
SHA256d9e8cd92f59d7f6f66a9ff7f934eaf3a35f94af07f5924e1a3711c1f8457585a
SHA51204265254464e4539e06bbbdca6ecd70e11431fb1bbf15629e9f6b17bbe6a6599b78ab4c3402ff6c37d5550553fd617e6d03005f23619cbfba29b9e8fc3e2ae42
-
Filesize
72KB
MD5c6707543e593772747e5e8499482e98f
SHA16fad5adeb71f1b610d3d99e72120369db397ca3f
SHA256d9e8cd92f59d7f6f66a9ff7f934eaf3a35f94af07f5924e1a3711c1f8457585a
SHA51204265254464e4539e06bbbdca6ecd70e11431fb1bbf15629e9f6b17bbe6a6599b78ab4c3402ff6c37d5550553fd617e6d03005f23619cbfba29b9e8fc3e2ae42
-
Filesize
72KB
MD52cde7279a4845cdf21c8ef36379bacd9
SHA1a1d2f8417759b99f8663db70b741a2a255188907
SHA256ec0eb85fffcbff2d4a1599be60ba9dff3c8fe7d9176e386f87f26da8de0088ac
SHA512f339f5e954f120d10a47b37fb9651e286ecf17df72b922a824774bc979dd42c1a2b6fd56bc39cd8cb2891c8dcd972e8648e01bb43fc61f021db4bd24a3f18dfb
-
Filesize
72KB
MD52cde7279a4845cdf21c8ef36379bacd9
SHA1a1d2f8417759b99f8663db70b741a2a255188907
SHA256ec0eb85fffcbff2d4a1599be60ba9dff3c8fe7d9176e386f87f26da8de0088ac
SHA512f339f5e954f120d10a47b37fb9651e286ecf17df72b922a824774bc979dd42c1a2b6fd56bc39cd8cb2891c8dcd972e8648e01bb43fc61f021db4bd24a3f18dfb
-
Filesize
72KB
MD5da9282da3418214e3d43ab918b953ebd
SHA186e3fdaae64cb33777b8ebf31d14f540a5820f00
SHA2568412d1b8afa5c284d78bf97522b3c45ac0e39d6dc446330d58a0bab4bf6852d2
SHA512364eb86323d5a84c8ce98c745e56f339f6f4acdd5d1d8906970e6373fa24017c0a513355a255b4a1b49c3a7eb54e606170d5104880a5193a8247a90f5ea74ee3
-
Filesize
72KB
MD5da9282da3418214e3d43ab918b953ebd
SHA186e3fdaae64cb33777b8ebf31d14f540a5820f00
SHA2568412d1b8afa5c284d78bf97522b3c45ac0e39d6dc446330d58a0bab4bf6852d2
SHA512364eb86323d5a84c8ce98c745e56f339f6f4acdd5d1d8906970e6373fa24017c0a513355a255b4a1b49c3a7eb54e606170d5104880a5193a8247a90f5ea74ee3
-
Filesize
72KB
MD5a803bc8bb78f130113514fd8c359e756
SHA14fd909f4d6ce32a4a46ebbc4383dfca6be929b70
SHA256be24140e1ab3db55c241a7d2c2da38cc9284c213ab83bb60b521c28de42d0a4c
SHA512b3edd780bd877b7b3dfaa64a12a235d97729a8b87f62a3837aae4e3bb73bf8a3c06f124b696153efeba95587d7ac9313ce0ab92995befd66b74c9533458827b2
-
Filesize
72KB
MD5a803bc8bb78f130113514fd8c359e756
SHA14fd909f4d6ce32a4a46ebbc4383dfca6be929b70
SHA256be24140e1ab3db55c241a7d2c2da38cc9284c213ab83bb60b521c28de42d0a4c
SHA512b3edd780bd877b7b3dfaa64a12a235d97729a8b87f62a3837aae4e3bb73bf8a3c06f124b696153efeba95587d7ac9313ce0ab92995befd66b74c9533458827b2
-
Filesize
72KB
MD52cde7279a4845cdf21c8ef36379bacd9
SHA1a1d2f8417759b99f8663db70b741a2a255188907
SHA256ec0eb85fffcbff2d4a1599be60ba9dff3c8fe7d9176e386f87f26da8de0088ac
SHA512f339f5e954f120d10a47b37fb9651e286ecf17df72b922a824774bc979dd42c1a2b6fd56bc39cd8cb2891c8dcd972e8648e01bb43fc61f021db4bd24a3f18dfb
-
Filesize
72KB
MD52cde7279a4845cdf21c8ef36379bacd9
SHA1a1d2f8417759b99f8663db70b741a2a255188907
SHA256ec0eb85fffcbff2d4a1599be60ba9dff3c8fe7d9176e386f87f26da8de0088ac
SHA512f339f5e954f120d10a47b37fb9651e286ecf17df72b922a824774bc979dd42c1a2b6fd56bc39cd8cb2891c8dcd972e8648e01bb43fc61f021db4bd24a3f18dfb
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD5890f4c016b9ae9bb9c7b4ba48a6496d1
SHA12596c508a6d85ba6d3d4daa4e1f53e24fcb1fb09
SHA25619d205bcf1e5b460c0504894bc6a5b386b74f00efb8678e5bfcb1689e6568fc0
SHA512a26404b105fe039db0e5c03550fdfc646286032d7cbfe3ce93286378d4e96f1565c1726ff5bc26b4cee8326babef2879d0a839805464e9c83698f8c45f1b7907
-
Filesize
72KB
MD5890f4c016b9ae9bb9c7b4ba48a6496d1
SHA12596c508a6d85ba6d3d4daa4e1f53e24fcb1fb09
SHA25619d205bcf1e5b460c0504894bc6a5b386b74f00efb8678e5bfcb1689e6568fc0
SHA512a26404b105fe039db0e5c03550fdfc646286032d7cbfe3ce93286378d4e96f1565c1726ff5bc26b4cee8326babef2879d0a839805464e9c83698f8c45f1b7907
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD500c51275fd2508fd7224b58fdbe9f765
SHA113d78381cbca2317db17151747777182d387b285
SHA2565182ba7ab22ba29c5785d079c61761f00b5923eedb8eff307b529163b8eb579c
SHA512075fdae08457c6a7ca7602f3a7f35416553911569b0b4169a9ca98fb3f0f4b0c3a7681a19e487996ebeec70ab1751c4425319fc4797e0882040204632e0b125a
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD53d7e2c70b2395407d3eaab4f5f3a10a5
SHA1840aac83e00abb7e5d2b84cd6e38a8221a1199d6
SHA2565581c8b79463a9e16b64e9f1b21a98e354bf8e95eb4b6409160481e298885e8c
SHA5129cb9fb10b28db4a63883c97450194b07de24bc6db47a5c122b26163c27befe935a52a549bd03d21705f9679ad6d9c0f332455b9d8f08668c0438ded8e5a847bf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD599963e9a139b4673ac0e0c716c1676d2
SHA150835e54a026a8635fb28b3103a53f42e2c2a411
SHA256910ede520f1d35f9e07b9988a950559f2e597ad3fcea18a4ed43a83fbcd70db2
SHA512c181934d91051d0f87724aa0c57e3bf2959ec6aff723910f0222e9501b798d80e6af7e8ca0b74126a8fd97436dd3ccf6f7866082d443497647a179d6b99bbfcf
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD5f90cc9162c917e740fe5a35bb40f17bb
SHA17cc0fee2af6f8cc4be55828e56b014c7719758d3
SHA256251f02c4e59376c2651a2ed6a058d5f4d2b10812e6b9b4a07b86e50e8be8db03
SHA512500b22851cee7cefd159bf3f06448f3490370f6a7651ecaf7f008304191a05c3606b98c6c7b2af013d965e29a563ad8cb0845c36fb3e397bcf316c9e2b9d5e0e
-
Filesize
72KB
MD50384653cb7b14c37b2843c84fbbb2abf
SHA1f0282e6db4c9b3413d9d5ed1c318e5e5f7e96656
SHA25612f830e8c7896c3950d38b800bf00e712874cca358fdd050122408d428ae993b
SHA51282d39ed8c4aec78267b47b667a46e4690145ff72b0d4cf2a4f8349e5d23a3e44901f1b8055407b3a2678b2d4eb5d2a115ce8f24aa9675d5e70a0ceb6ad45ca7f
-
Filesize
72KB
MD50384653cb7b14c37b2843c84fbbb2abf
SHA1f0282e6db4c9b3413d9d5ed1c318e5e5f7e96656
SHA25612f830e8c7896c3950d38b800bf00e712874cca358fdd050122408d428ae993b
SHA51282d39ed8c4aec78267b47b667a46e4690145ff72b0d4cf2a4f8349e5d23a3e44901f1b8055407b3a2678b2d4eb5d2a115ce8f24aa9675d5e70a0ceb6ad45ca7f
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5ea9b65a3577e60248061675daa4cf907
SHA10546fe9e588e8ef0c616f80368f98e5596edba72
SHA256a67b46426a490306930185bde1d672bf3fdb5cc4e23ffef6bb6be45fbd967c6c
SHA5125b750310a0852e0d467f4028cc7b7eea89e8c580e7342375046180c65b99b439cf34d8e8fd2e547e94a0564d7c40799a43628e38bc91fcd60eab09912f85335e
-
Filesize
72KB
MD5dc273084d378a6404bc34473da780e3e
SHA1c8c7ee596d997f242a88d2742b3b0075ca4d83c0
SHA25680142875677466d3b174c60bfab0a3c92dfac8abbb356f055ff26d127e682f87
SHA5120dd57c592730b88c7dceb3fb7034d0434de45554a938a08b14cdba9eacb9debfd383fb7464c4d228e8602d5627559e480495af8131da05a8b0d8effbbba40659
-
Filesize
72KB
MD5dc273084d378a6404bc34473da780e3e
SHA1c8c7ee596d997f242a88d2742b3b0075ca4d83c0
SHA25680142875677466d3b174c60bfab0a3c92dfac8abbb356f055ff26d127e682f87
SHA5120dd57c592730b88c7dceb3fb7034d0434de45554a938a08b14cdba9eacb9debfd383fb7464c4d228e8602d5627559e480495af8131da05a8b0d8effbbba40659
-
Filesize
72KB
MD59c31e7312f66fb3d9e04fe02608ccc78
SHA163522d8a46d12593e6e46ca27a2bbd783062d0b1
SHA256f7835525c0a414967c56947fba98917545a01d2e022a728d849a20468977363b
SHA512c4c77532f8f8763c7bb858de4c6dbead18a86c8457fc0b2ddbbeb9482b6f4404b7d61b05411663c5876198a9ebe5cdd8ba7837d972816a944aa0cca0ce67f8a4
-
Filesize
72KB
MD59c31e7312f66fb3d9e04fe02608ccc78
SHA163522d8a46d12593e6e46ca27a2bbd783062d0b1
SHA256f7835525c0a414967c56947fba98917545a01d2e022a728d849a20468977363b
SHA512c4c77532f8f8763c7bb858de4c6dbead18a86c8457fc0b2ddbbeb9482b6f4404b7d61b05411663c5876198a9ebe5cdd8ba7837d972816a944aa0cca0ce67f8a4