Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
64s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe
Resource
win10v2004-20220812-en
General
-
Target
8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe
-
Size
72KB
-
MD5
092ca45d247da08b3fc8c9471e5d7207
-
SHA1
31429febb195bee6c17dc368ff709654f84acca3
-
SHA256
8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d
-
SHA512
f8563a894ed1b481424a374a368fb5c471c6ad76021a7c4402b2de5dc9072f8a6c115288c5d259f1e02a49d390000d3e95f29160d92c4fdefc4d4992eaf7d774
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2s:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPY
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 40 IoCs
pid Process 1756 backup.exe 480 backup.exe 1512 backup.exe 1336 backup.exe 1168 data.exe 832 System Restore.exe 1536 backup.exe 760 backup.exe 108 backup.exe 392 backup.exe 1724 backup.exe 1736 data.exe 1820 backup.exe 1744 backup.exe 1068 backup.exe 1840 backup.exe 952 backup.exe 584 backup.exe 1608 backup.exe 868 backup.exe 520 System Restore.exe 1900 backup.exe 1528 backup.exe 1708 backup.exe 1992 backup.exe 1348 backup.exe 2016 backup.exe 1544 backup.exe 1632 backup.exe 1352 backup.exe 364 backup.exe 1652 backup.exe 1664 backup.exe 892 backup.exe 1580 backup.exe 948 backup.exe 1164 System Restore.exe 1316 backup.exe 1336 backup.exe 1324 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 760 backup.exe 760 backup.exe 108 backup.exe 108 backup.exe 760 backup.exe 760 backup.exe 1724 backup.exe 1724 backup.exe 1736 data.exe 1736 data.exe 1724 backup.exe 1724 backup.exe 1744 backup.exe 1744 backup.exe 1068 backup.exe 1068 backup.exe 1068 backup.exe 1068 backup.exe 1068 backup.exe 1068 backup.exe 1744 backup.exe 760 backup.exe 1724 backup.exe 1744 backup.exe 1724 backup.exe 760 backup.exe 584 backup.exe 584 backup.exe 520 System Restore.exe 1608 backup.exe 1608 backup.exe 520 System Restore.exe 1744 backup.exe 1744 backup.exe 584 backup.exe 584 backup.exe 1528 backup.exe 1528 backup.exe 2016 backup.exe 2016 backup.exe 584 backup.exe 584 backup.exe 520 System Restore.exe 520 System Restore.exe 1992 backup.exe 1992 backup.exe 520 System Restore.exe 520 System Restore.exe 2016 backup.exe 2016 backup.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe backup.exe File opened for modification C:\Program Files\7-Zip\data.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe System Restore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 1756 backup.exe 480 backup.exe 1512 backup.exe 1336 backup.exe 1168 data.exe 832 System Restore.exe 1536 backup.exe 760 backup.exe 108 backup.exe 392 backup.exe 1724 backup.exe 1736 data.exe 1820 backup.exe 1744 backup.exe 1068 backup.exe 1840 backup.exe 1580 backup.exe 1500 backup.exe 1196 backup.exe 1292 backup.exe 1324 backup.exe 1416 backup.exe 584 backup.exe 1608 backup.exe 268 backup.exe 868 backup.exe 520 System Restore.exe 1900 backup.exe 1528 backup.exe 1616 backup.exe 1992 backup.exe 1348 backup.exe 1708 backup.exe 2016 backup.exe 1352 backup.exe 1672 backup.exe 1632 backup.exe 364 backup.exe 1652 backup.exe 1664 backup.exe 892 backup.exe 1840 backup.exe 1828 backup.exe 1580 backup.exe 948 backup.exe 1164 System Restore.exe 1324 backup.exe 1336 backup.exe 1316 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 1756 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 28 PID 1932 wrote to memory of 1756 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 28 PID 1932 wrote to memory of 1756 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 28 PID 1932 wrote to memory of 1756 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 28 PID 1932 wrote to memory of 480 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 29 PID 1932 wrote to memory of 480 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 29 PID 1932 wrote to memory of 480 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 29 PID 1932 wrote to memory of 480 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 29 PID 1932 wrote to memory of 1512 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 30 PID 1932 wrote to memory of 1512 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 30 PID 1932 wrote to memory of 1512 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 30 PID 1932 wrote to memory of 1512 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 30 PID 1932 wrote to memory of 1336 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 31 PID 1932 wrote to memory of 1336 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 31 PID 1932 wrote to memory of 1336 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 31 PID 1932 wrote to memory of 1336 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 31 PID 1932 wrote to memory of 1168 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 32 PID 1932 wrote to memory of 1168 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 32 PID 1932 wrote to memory of 1168 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 32 PID 1932 wrote to memory of 1168 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 32 PID 1932 wrote to memory of 832 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 33 PID 1932 wrote to memory of 832 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 33 PID 1932 wrote to memory of 832 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 33 PID 1932 wrote to memory of 832 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 33 PID 1932 wrote to memory of 1536 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 34 PID 1932 wrote to memory of 1536 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 34 PID 1932 wrote to memory of 1536 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 34 PID 1932 wrote to memory of 1536 1932 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe 34 PID 1756 wrote to memory of 760 1756 backup.exe 35 PID 1756 wrote to memory of 760 1756 backup.exe 35 PID 1756 wrote to memory of 760 1756 backup.exe 35 PID 1756 wrote to memory of 760 1756 backup.exe 35 PID 760 wrote to memory of 108 760 backup.exe 36 PID 760 wrote to memory of 108 760 backup.exe 36 PID 760 wrote to memory of 108 760 backup.exe 36 PID 760 wrote to memory of 108 760 backup.exe 36 PID 108 wrote to memory of 392 108 backup.exe 37 PID 108 wrote to memory of 392 108 backup.exe 37 PID 108 wrote to memory of 392 108 backup.exe 37 PID 108 wrote to memory of 392 108 backup.exe 37 PID 760 wrote to memory of 1724 760 backup.exe 38 PID 760 wrote to memory of 1724 760 backup.exe 38 PID 760 wrote to memory of 1724 760 backup.exe 38 PID 760 wrote to memory of 1724 760 backup.exe 38 PID 1724 wrote to memory of 1736 1724 backup.exe 39 PID 1724 wrote to memory of 1736 1724 backup.exe 39 PID 1724 wrote to memory of 1736 1724 backup.exe 39 PID 1724 wrote to memory of 1736 1724 backup.exe 39 PID 1736 wrote to memory of 1820 1736 data.exe 40 PID 1736 wrote to memory of 1820 1736 data.exe 40 PID 1736 wrote to memory of 1820 1736 data.exe 40 PID 1736 wrote to memory of 1820 1736 data.exe 40 PID 1724 wrote to memory of 1744 1724 backup.exe 41 PID 1724 wrote to memory of 1744 1724 backup.exe 41 PID 1724 wrote to memory of 1744 1724 backup.exe 41 PID 1724 wrote to memory of 1744 1724 backup.exe 41 PID 1744 wrote to memory of 1068 1744 backup.exe 42 PID 1744 wrote to memory of 1068 1744 backup.exe 42 PID 1744 wrote to memory of 1068 1744 backup.exe 42 PID 1744 wrote to memory of 1068 1744 backup.exe 42 PID 1068 wrote to memory of 1840 1068 backup.exe 43 PID 1068 wrote to memory of 1840 1068 backup.exe 43 PID 1068 wrote to memory of 1840 1068 backup.exe 43 PID 1068 wrote to memory of 1840 1068 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe"C:\Users\Admin\AppData\Local\Temp\8a1858b51bdc4d36c060d832a3e0db092029d792fc32ebc5fe2c7946d0e0b65d.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\2878721302\backup.exeC:\Users\Admin\AppData\Local\Temp\2878721302\backup.exe C:\Users\Admin\AppData\Local\Temp\2878721302\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1756 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:760 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:108 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:392
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1724 -
C:\Program Files\7-Zip\data.exe"C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1736 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1744 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1068 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:952 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1196
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1828
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:1168
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵PID:1992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:1592
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:868
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1348
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:836
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1256
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:108
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1112
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1100
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:868
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:364
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
C:\Program Files\DVD Maker\System Restore.exe"C:\Program Files\DVD Maker\System Restore.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:520 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1352
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1652
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1336
-
-
C:\Program Files\DVD Maker\ja-JP\update.exe"C:\Program Files\DVD Maker\ja-JP\update.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1004
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1500
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1480
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1284
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1548
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:624
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:832
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:1596
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1624
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1924
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:948
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1768
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1984
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:580
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:1064
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:108
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1616
-
-
-
-
C:\Program Files (x86)\Common Files\update.exe"C:\Program Files (x86)\Common Files\update.exe" C:\Program Files (x86)\Common Files\5⤵PID:1276
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1352
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:824
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1348
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:1416
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:628
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵PID:1580
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:676
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:936
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:480
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5dce09365d47251c2227489489aa2990e
SHA1ffc33bee0ffecb81ae46cfde2bd1b31a0c225646
SHA256bb7c34775e715d947011cfc9abbe7970ea2f8ed0e6d6f5b13ecfa8c093076d9d
SHA5120edf6691bda3b0e45d1da552ef345de4f9f0a6228c78a840fdf190c469850cd662f0af9fda18d67a4883b547ad2d571b887dcb20c26df9cc7734b4c7e2507fd5
-
Filesize
72KB
MD5a2e25e969e10e5536610d4577a65ce77
SHA1989b2f72eb68dd96578739eeee839920ece6f300
SHA25632adec5246f2a0531938982967e7222bc352d8c27d5e32a83dd5ddd1f2cd31f3
SHA512d603c3325fa45cf3701546e62b464d7e4c64128377ee60d12e0700d513517525213289ffe51698085295f2665bde6718110353726cb418c16fd3a82cf0b66dbd
-
Filesize
72KB
MD5a2e25e969e10e5536610d4577a65ce77
SHA1989b2f72eb68dd96578739eeee839920ece6f300
SHA25632adec5246f2a0531938982967e7222bc352d8c27d5e32a83dd5ddd1f2cd31f3
SHA512d603c3325fa45cf3701546e62b464d7e4c64128377ee60d12e0700d513517525213289ffe51698085295f2665bde6718110353726cb418c16fd3a82cf0b66dbd
-
Filesize
72KB
MD5d99b8a499ccfde0393be554391851702
SHA1403aa4ad0341a7ad0e21d22f33c9437770959fb8
SHA256c4563c24eec7b3fdc301b3f4babc2d2fbaa7f224e0e4df3f5ab9f23ac7b806fa
SHA512b0bb9a521ae42c1ce169ef1d19b622b58d9b5e7b613a8349250196800e74ff38c37735b8b1013e597eab43bdcef8f4e3aeeb2bd17ac6f0d50d7e1f9484d369b1
-
Filesize
72KB
MD577d2ef1d0d9220d792ce7860f4190d8b
SHA120e9e03b08d28eb571f638a3fc70b83e043bf151
SHA2560fd2891ccb1bc682c0beab6643555e876142c44b01540b4802b705848c305717
SHA51251c1aa4d60cd32bf14c58ca20621c5248c7f2c863c2a659b39199bb970bc8cab1e9ff1816c56389c6f5fbed161f93b17119a9c04be6f8b91e574512569ed0c52
-
Filesize
72KB
MD577d2ef1d0d9220d792ce7860f4190d8b
SHA120e9e03b08d28eb571f638a3fc70b83e043bf151
SHA2560fd2891ccb1bc682c0beab6643555e876142c44b01540b4802b705848c305717
SHA51251c1aa4d60cd32bf14c58ca20621c5248c7f2c863c2a659b39199bb970bc8cab1e9ff1816c56389c6f5fbed161f93b17119a9c04be6f8b91e574512569ed0c52
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD5b17be85c4b9fb050c1bb86af25a4f84a
SHA181064a1d960aef41b36dad7a653511afebf0f496
SHA2565966b00a8356777d03698ceba3011f4b8356ee6c09b2fc1462a13d64dbdef68a
SHA512b53b7d19f0b48920579b5407db28ae809cddee367c04e6ff50c638b939960b2c954a2eee4e9e03e82f2c06441ac02c3046a8b15e785026d6355a28c8670af448
-
Filesize
72KB
MD544db935224d7a20bb150a8a031489099
SHA1f4f1b2680064499e539020650d904a29e892d2c4
SHA2569fbf764ee50664f90b46135a309543ab3ce753fb22c81235cf50b0f1377ed54f
SHA51269d30c3aea73fd6627aa521a123e757a7fbc31b7085998d2ba8606330cd1884a076c1ff6f27822c8cedbf14506519c05527c2bef46dcedb18f7f798381b95cce
-
Filesize
72KB
MD544db935224d7a20bb150a8a031489099
SHA1f4f1b2680064499e539020650d904a29e892d2c4
SHA2569fbf764ee50664f90b46135a309543ab3ce753fb22c81235cf50b0f1377ed54f
SHA51269d30c3aea73fd6627aa521a123e757a7fbc31b7085998d2ba8606330cd1884a076c1ff6f27822c8cedbf14506519c05527c2bef46dcedb18f7f798381b95cce
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD57d0a8521aa6ba28d3fdffb83c51d009c
SHA182032ed848c12b1b00d0cf9d5dd5464690a5c7d9
SHA256fabce6a5b164357b9a2227c0329c2981968fe250daef1e54d014617788655bbd
SHA5129b69254aae15af6f28c48694372301b2ba841872e034403c8d8efd582a8a26088a7026db53441529833b29db909304095ea96d31cd1a00f8291d53fd33a2ae0a
-
Filesize
72KB
MD57d0a8521aa6ba28d3fdffb83c51d009c
SHA182032ed848c12b1b00d0cf9d5dd5464690a5c7d9
SHA256fabce6a5b164357b9a2227c0329c2981968fe250daef1e54d014617788655bbd
SHA5129b69254aae15af6f28c48694372301b2ba841872e034403c8d8efd582a8a26088a7026db53441529833b29db909304095ea96d31cd1a00f8291d53fd33a2ae0a
-
Filesize
72KB
MD5ae1b49567ec6a66be05a7a0348dad7fc
SHA1ad821404ef483ab268165cc7cd83060f63ab931d
SHA25601f89b98b0f93ab219d668611ed64b11f3c779f8e54b2b41566af6bb07518789
SHA512221032c54d851e60247f048467874d0265019b2e4eba70c4385366dfd3f0cfe928cd493e38a832452054087938873e84abe777c16d7fdd1bb1be0c566b227489
-
Filesize
72KB
MD5ae1b49567ec6a66be05a7a0348dad7fc
SHA1ad821404ef483ab268165cc7cd83060f63ab931d
SHA25601f89b98b0f93ab219d668611ed64b11f3c779f8e54b2b41566af6bb07518789
SHA512221032c54d851e60247f048467874d0265019b2e4eba70c4385366dfd3f0cfe928cd493e38a832452054087938873e84abe777c16d7fdd1bb1be0c566b227489
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD53f8cba3be0d3bfa14ac3ae824409fc36
SHA172662d7a338c22691d051a08622afa4d5528de4d
SHA256839e2caa0f393f8d48731a1f4f3c3080a7d54e85819d79671dcb544ecb78238e
SHA5127caf40306fdb14f92572774986146d400b0de95d6e7009c7925cefbac4c9b8618470ed781e6db449da2dcf974df522743b49d0cc74f4b87a192442014917dfc2
-
Filesize
72KB
MD53f8cba3be0d3bfa14ac3ae824409fc36
SHA172662d7a338c22691d051a08622afa4d5528de4d
SHA256839e2caa0f393f8d48731a1f4f3c3080a7d54e85819d79671dcb544ecb78238e
SHA5127caf40306fdb14f92572774986146d400b0de95d6e7009c7925cefbac4c9b8618470ed781e6db449da2dcf974df522743b49d0cc74f4b87a192442014917dfc2
-
Filesize
72KB
MD5dce09365d47251c2227489489aa2990e
SHA1ffc33bee0ffecb81ae46cfde2bd1b31a0c225646
SHA256bb7c34775e715d947011cfc9abbe7970ea2f8ed0e6d6f5b13ecfa8c093076d9d
SHA5120edf6691bda3b0e45d1da552ef345de4f9f0a6228c78a840fdf190c469850cd662f0af9fda18d67a4883b547ad2d571b887dcb20c26df9cc7734b4c7e2507fd5
-
Filesize
72KB
MD5dce09365d47251c2227489489aa2990e
SHA1ffc33bee0ffecb81ae46cfde2bd1b31a0c225646
SHA256bb7c34775e715d947011cfc9abbe7970ea2f8ed0e6d6f5b13ecfa8c093076d9d
SHA5120edf6691bda3b0e45d1da552ef345de4f9f0a6228c78a840fdf190c469850cd662f0af9fda18d67a4883b547ad2d571b887dcb20c26df9cc7734b4c7e2507fd5
-
Filesize
72KB
MD5a2e25e969e10e5536610d4577a65ce77
SHA1989b2f72eb68dd96578739eeee839920ece6f300
SHA25632adec5246f2a0531938982967e7222bc352d8c27d5e32a83dd5ddd1f2cd31f3
SHA512d603c3325fa45cf3701546e62b464d7e4c64128377ee60d12e0700d513517525213289ffe51698085295f2665bde6718110353726cb418c16fd3a82cf0b66dbd
-
Filesize
72KB
MD5a2e25e969e10e5536610d4577a65ce77
SHA1989b2f72eb68dd96578739eeee839920ece6f300
SHA25632adec5246f2a0531938982967e7222bc352d8c27d5e32a83dd5ddd1f2cd31f3
SHA512d603c3325fa45cf3701546e62b464d7e4c64128377ee60d12e0700d513517525213289ffe51698085295f2665bde6718110353726cb418c16fd3a82cf0b66dbd
-
Filesize
72KB
MD543d32a0b0ff64f0121599c4dec2820c8
SHA1f1965212e72e6bdf2d68ec016ace11780c0f3ca5
SHA2567a8080325bc659466a9de9ccaea33c0505d7dd1964aeef5c3244e27dfda477c7
SHA512bfe6cc327a77d6e1fc7457323cf3eca0a881ef4d6da994294380e8aedb68ec6539bfad45b051169f9fc1aeea3ec4d19d79ee5415d1701b7bda4fd11503ac96b1
-
Filesize
72KB
MD5d99b8a499ccfde0393be554391851702
SHA1403aa4ad0341a7ad0e21d22f33c9437770959fb8
SHA256c4563c24eec7b3fdc301b3f4babc2d2fbaa7f224e0e4df3f5ab9f23ac7b806fa
SHA512b0bb9a521ae42c1ce169ef1d19b622b58d9b5e7b613a8349250196800e74ff38c37735b8b1013e597eab43bdcef8f4e3aeeb2bd17ac6f0d50d7e1f9484d369b1
-
Filesize
72KB
MD5d99b8a499ccfde0393be554391851702
SHA1403aa4ad0341a7ad0e21d22f33c9437770959fb8
SHA256c4563c24eec7b3fdc301b3f4babc2d2fbaa7f224e0e4df3f5ab9f23ac7b806fa
SHA512b0bb9a521ae42c1ce169ef1d19b622b58d9b5e7b613a8349250196800e74ff38c37735b8b1013e597eab43bdcef8f4e3aeeb2bd17ac6f0d50d7e1f9484d369b1
-
Filesize
72KB
MD577d2ef1d0d9220d792ce7860f4190d8b
SHA120e9e03b08d28eb571f638a3fc70b83e043bf151
SHA2560fd2891ccb1bc682c0beab6643555e876142c44b01540b4802b705848c305717
SHA51251c1aa4d60cd32bf14c58ca20621c5248c7f2c863c2a659b39199bb970bc8cab1e9ff1816c56389c6f5fbed161f93b17119a9c04be6f8b91e574512569ed0c52
-
Filesize
72KB
MD577d2ef1d0d9220d792ce7860f4190d8b
SHA120e9e03b08d28eb571f638a3fc70b83e043bf151
SHA2560fd2891ccb1bc682c0beab6643555e876142c44b01540b4802b705848c305717
SHA51251c1aa4d60cd32bf14c58ca20621c5248c7f2c863c2a659b39199bb970bc8cab1e9ff1816c56389c6f5fbed161f93b17119a9c04be6f8b91e574512569ed0c52
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD5b17be85c4b9fb050c1bb86af25a4f84a
SHA181064a1d960aef41b36dad7a653511afebf0f496
SHA2565966b00a8356777d03698ceba3011f4b8356ee6c09b2fc1462a13d64dbdef68a
SHA512b53b7d19f0b48920579b5407db28ae809cddee367c04e6ff50c638b939960b2c954a2eee4e9e03e82f2c06441ac02c3046a8b15e785026d6355a28c8670af448
-
Filesize
72KB
MD5b17be85c4b9fb050c1bb86af25a4f84a
SHA181064a1d960aef41b36dad7a653511afebf0f496
SHA2565966b00a8356777d03698ceba3011f4b8356ee6c09b2fc1462a13d64dbdef68a
SHA512b53b7d19f0b48920579b5407db28ae809cddee367c04e6ff50c638b939960b2c954a2eee4e9e03e82f2c06441ac02c3046a8b15e785026d6355a28c8670af448
-
Filesize
72KB
MD544db935224d7a20bb150a8a031489099
SHA1f4f1b2680064499e539020650d904a29e892d2c4
SHA2569fbf764ee50664f90b46135a309543ab3ce753fb22c81235cf50b0f1377ed54f
SHA51269d30c3aea73fd6627aa521a123e757a7fbc31b7085998d2ba8606330cd1884a076c1ff6f27822c8cedbf14506519c05527c2bef46dcedb18f7f798381b95cce
-
Filesize
72KB
MD544db935224d7a20bb150a8a031489099
SHA1f4f1b2680064499e539020650d904a29e892d2c4
SHA2569fbf764ee50664f90b46135a309543ab3ce753fb22c81235cf50b0f1377ed54f
SHA51269d30c3aea73fd6627aa521a123e757a7fbc31b7085998d2ba8606330cd1884a076c1ff6f27822c8cedbf14506519c05527c2bef46dcedb18f7f798381b95cce
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD57fbf22b24bf6c0625a0c738c500af073
SHA11346fad309ee19928637cb2b6e479642cbd0299d
SHA25640b29d6b5636bf2f7080d9fcc78663ed1a9e6e9aeb84e8c3f46995b72f912497
SHA51239ade3feb4a3d44c05b061c88ac452978cf1b282105f2c4dba9995c22cb4f81d949136d26c1dfd79df564df7d89206eed9ec95f02f7e5416059cecc999c7f594
-
Filesize
72KB
MD53b3f123b5faa858fa7387bbaa71dbd98
SHA128e04dae6479150b33eb375c721b894c1dfd4bd4
SHA256a1f56cb280ae04442eddab7c70c02e665672de8b602f88a0a3cabce99974b40e
SHA51276ee255e1827df47a44d101d1be84d4fe01908a963e17002aa465cbd84778be932a67d39641631068a9214075d8bf3bd7e97cd39ab2eee8cdd5869119c2527a2
-
Filesize
72KB
MD53b3f123b5faa858fa7387bbaa71dbd98
SHA128e04dae6479150b33eb375c721b894c1dfd4bd4
SHA256a1f56cb280ae04442eddab7c70c02e665672de8b602f88a0a3cabce99974b40e
SHA51276ee255e1827df47a44d101d1be84d4fe01908a963e17002aa465cbd84778be932a67d39641631068a9214075d8bf3bd7e97cd39ab2eee8cdd5869119c2527a2
-
Filesize
72KB
MD57d0a8521aa6ba28d3fdffb83c51d009c
SHA182032ed848c12b1b00d0cf9d5dd5464690a5c7d9
SHA256fabce6a5b164357b9a2227c0329c2981968fe250daef1e54d014617788655bbd
SHA5129b69254aae15af6f28c48694372301b2ba841872e034403c8d8efd582a8a26088a7026db53441529833b29db909304095ea96d31cd1a00f8291d53fd33a2ae0a
-
Filesize
72KB
MD57d0a8521aa6ba28d3fdffb83c51d009c
SHA182032ed848c12b1b00d0cf9d5dd5464690a5c7d9
SHA256fabce6a5b164357b9a2227c0329c2981968fe250daef1e54d014617788655bbd
SHA5129b69254aae15af6f28c48694372301b2ba841872e034403c8d8efd582a8a26088a7026db53441529833b29db909304095ea96d31cd1a00f8291d53fd33a2ae0a
-
Filesize
72KB
MD52b83f201925ba7cc584ce2319a1e3333
SHA12b2fd01cca2c494856cf13157522774498521ce6
SHA256fba64abe9c7dfe652302ca28f3497c7e2595ab16b53bda5e3da40a6a2d640997
SHA5128393b36999ecc5caa1bb596ab8895d1788b7deedce203d024455bc7f966c5811c027a8fb7f4090fddf2d2b6342f379eccf8525d7d6a8c04161fa3eee8306599b
-
Filesize
72KB
MD52b83f201925ba7cc584ce2319a1e3333
SHA12b2fd01cca2c494856cf13157522774498521ce6
SHA256fba64abe9c7dfe652302ca28f3497c7e2595ab16b53bda5e3da40a6a2d640997
SHA5128393b36999ecc5caa1bb596ab8895d1788b7deedce203d024455bc7f966c5811c027a8fb7f4090fddf2d2b6342f379eccf8525d7d6a8c04161fa3eee8306599b
-
Filesize
72KB
MD5ae1b49567ec6a66be05a7a0348dad7fc
SHA1ad821404ef483ab268165cc7cd83060f63ab931d
SHA25601f89b98b0f93ab219d668611ed64b11f3c779f8e54b2b41566af6bb07518789
SHA512221032c54d851e60247f048467874d0265019b2e4eba70c4385366dfd3f0cfe928cd493e38a832452054087938873e84abe777c16d7fdd1bb1be0c566b227489
-
Filesize
72KB
MD5ae1b49567ec6a66be05a7a0348dad7fc
SHA1ad821404ef483ab268165cc7cd83060f63ab931d
SHA25601f89b98b0f93ab219d668611ed64b11f3c779f8e54b2b41566af6bb07518789
SHA512221032c54d851e60247f048467874d0265019b2e4eba70c4385366dfd3f0cfe928cd493e38a832452054087938873e84abe777c16d7fdd1bb1be0c566b227489
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3
-
Filesize
72KB
MD58282e76530fc07b706ba975e91c68bac
SHA1739f60396cc9927936581f16e00291fb085d3c5e
SHA256704f10ca38f2219a0925bf696ace0750020f861114651e653759cad4619996a2
SHA5122bf1d423661771a21193b35b59684052bd7117fd40cba625646c3daa22f345872a8f429846259cfb2d43415b912cc7ca1e493f339105d2194cfca25d741e57f3