Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:34
Static task
static1
Behavioral task
behavioral1
Sample
f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe
Resource
win10v2004-20220901-en
General
-
Target
f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe
-
Size
72KB
-
MD5
02071a99be33a0d37245590cb3d5ea20
-
SHA1
9917c57ffbf7010bc937111b49faa677694a31bf
-
SHA256
f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047
-
SHA512
d46aae7b58f21b8546215654c89c7a179dbc19211a260053ae9c296364ac0e9b434b3cd412540c993c11180d57ba40221c8e2670b6e42beae22c6aec011867d1
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2A:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 60 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1736 backup.exe 944 backup.exe 1300 backup.exe 316 backup.exe 1504 backup.exe 580 backup.exe 1804 backup.exe 1540 backup.exe 560 backup.exe 1764 backup.exe 1516 backup.exe 1624 backup.exe 1340 backup.exe 108 backup.exe 1348 data.exe 1372 backup.exe 1136 backup.exe 972 backup.exe 604 backup.exe 1048 backup.exe 1508 backup.exe 1176 backup.exe 268 backup.exe 288 backup.exe 1864 backup.exe 748 backup.exe 1560 backup.exe 1712 backup.exe 1612 backup.exe 2032 backup.exe 292 backup.exe 1944 backup.exe 1964 backup.exe 1800 update.exe 792 backup.exe 968 backup.exe 988 backup.exe 928 backup.exe 1932 backup.exe 1408 data.exe 1748 backup.exe 1096 backup.exe 1624 backup.exe 620 backup.exe 952 backup.exe 604 backup.exe 320 backup.exe 1924 backup.exe 1320 backup.exe 1824 backup.exe 268 backup.exe 580 backup.exe 1572 update.exe 1704 backup.exe 608 backup.exe 1012 backup.exe 1084 backup.exe 1708 backup.exe 112 backup.exe 1424 backup.exe 948 backup.exe 968 backup.exe 1684 backup.exe 1180 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1540 backup.exe 1540 backup.exe 560 backup.exe 560 backup.exe 1540 backup.exe 1540 backup.exe 1516 backup.exe 1516 backup.exe 1624 backup.exe 1624 backup.exe 1516 backup.exe 1516 backup.exe 108 backup.exe 108 backup.exe 1348 data.exe 1348 data.exe 1348 data.exe 1348 data.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1136 backup.exe 1540 backup.exe 1540 backup.exe 108 backup.exe 1348 data.exe 108 backup.exe 1516 backup.exe 1348 data.exe 1516 backup.exe 1136 backup.exe 1136 backup.exe 1516 backup.exe 108 backup.exe 1516 backup.exe 108 backup.exe 1348 data.exe 1540 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe data.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 1736 backup.exe 944 backup.exe 1300 backup.exe 316 backup.exe 1504 backup.exe 580 backup.exe 1804 backup.exe 1540 backup.exe 560 backup.exe 1764 backup.exe 1516 backup.exe 1624 backup.exe 1340 backup.exe 108 backup.exe 1348 data.exe 1372 backup.exe 1136 backup.exe 972 backup.exe 604 backup.exe 1048 backup.exe 1508 backup.exe 1176 backup.exe 268 backup.exe 288 backup.exe 1864 backup.exe 748 backup.exe 1712 backup.exe 1612 backup.exe 1560 backup.exe 2032 backup.exe 292 backup.exe 1944 backup.exe 1964 backup.exe 792 backup.exe 1800 update.exe 968 backup.exe 1932 backup.exe 1624 backup.exe 1748 backup.exe 988 backup.exe 1096 backup.exe 620 backup.exe 928 backup.exe 1408 data.exe 604 backup.exe 952 backup.exe 1320 backup.exe 1924 backup.exe 320 backup.exe 1824 backup.exe 268 backup.exe 580 backup.exe 1704 backup.exe 1572 update.exe 608 backup.exe 1084 backup.exe 1708 backup.exe 112 backup.exe 1424 backup.exe 964 update.exe 1068 System Restore.exe 948 backup.exe 1180 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 1736 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 28 PID 1628 wrote to memory of 1736 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 28 PID 1628 wrote to memory of 1736 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 28 PID 1628 wrote to memory of 1736 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 28 PID 1628 wrote to memory of 944 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 29 PID 1628 wrote to memory of 944 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 29 PID 1628 wrote to memory of 944 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 29 PID 1628 wrote to memory of 944 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 29 PID 1628 wrote to memory of 1300 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 30 PID 1628 wrote to memory of 1300 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 30 PID 1628 wrote to memory of 1300 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 30 PID 1628 wrote to memory of 1300 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 30 PID 1628 wrote to memory of 316 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 31 PID 1628 wrote to memory of 316 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 31 PID 1628 wrote to memory of 316 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 31 PID 1628 wrote to memory of 316 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 31 PID 1628 wrote to memory of 1504 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 32 PID 1628 wrote to memory of 1504 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 32 PID 1628 wrote to memory of 1504 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 32 PID 1628 wrote to memory of 1504 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 32 PID 1628 wrote to memory of 580 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 33 PID 1628 wrote to memory of 580 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 33 PID 1628 wrote to memory of 580 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 33 PID 1628 wrote to memory of 580 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 33 PID 1628 wrote to memory of 1804 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 34 PID 1628 wrote to memory of 1804 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 34 PID 1628 wrote to memory of 1804 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 34 PID 1628 wrote to memory of 1804 1628 f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe 34 PID 1736 wrote to memory of 1540 1736 backup.exe 35 PID 1736 wrote to memory of 1540 1736 backup.exe 35 PID 1736 wrote to memory of 1540 1736 backup.exe 35 PID 1736 wrote to memory of 1540 1736 backup.exe 35 PID 1540 wrote to memory of 560 1540 backup.exe 36 PID 1540 wrote to memory of 560 1540 backup.exe 36 PID 1540 wrote to memory of 560 1540 backup.exe 36 PID 1540 wrote to memory of 560 1540 backup.exe 36 PID 560 wrote to memory of 1764 560 backup.exe 37 PID 560 wrote to memory of 1764 560 backup.exe 37 PID 560 wrote to memory of 1764 560 backup.exe 37 PID 560 wrote to memory of 1764 560 backup.exe 37 PID 1540 wrote to memory of 1516 1540 backup.exe 38 PID 1540 wrote to memory of 1516 1540 backup.exe 38 PID 1540 wrote to memory of 1516 1540 backup.exe 38 PID 1540 wrote to memory of 1516 1540 backup.exe 38 PID 1516 wrote to memory of 1624 1516 backup.exe 39 PID 1516 wrote to memory of 1624 1516 backup.exe 39 PID 1516 wrote to memory of 1624 1516 backup.exe 39 PID 1516 wrote to memory of 1624 1516 backup.exe 39 PID 1624 wrote to memory of 1340 1624 backup.exe 40 PID 1624 wrote to memory of 1340 1624 backup.exe 40 PID 1624 wrote to memory of 1340 1624 backup.exe 40 PID 1624 wrote to memory of 1340 1624 backup.exe 40 PID 1516 wrote to memory of 108 1516 backup.exe 41 PID 1516 wrote to memory of 108 1516 backup.exe 41 PID 1516 wrote to memory of 108 1516 backup.exe 41 PID 1516 wrote to memory of 108 1516 backup.exe 41 PID 108 wrote to memory of 1348 108 backup.exe 42 PID 108 wrote to memory of 1348 108 backup.exe 42 PID 108 wrote to memory of 1348 108 backup.exe 42 PID 108 wrote to memory of 1348 108 backup.exe 42 PID 1348 wrote to memory of 1372 1348 data.exe 43 PID 1348 wrote to memory of 1372 1348 data.exe 43 PID 1348 wrote to memory of 1372 1348 data.exe 43 PID 1348 wrote to memory of 1372 1348 data.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe"C:\Users\Admin\AppData\Local\Temp\f512c5920c8dd4ed614171d8470fc1616fe3b9909f886d00ff64bb8dad6eb047.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\2638756576\backup.exeC:\Users\Admin\AppData\Local\Temp\2638756576\backup.exe C:\Users\Admin\AppData\Local\Temp\2638756576\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1540 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:560 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1624 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1340
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:108 -
C:\Program Files\Common Files\Microsoft Shared\data.exe"C:\Program Files\Common Files\Microsoft Shared\data.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1348 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1048
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1508
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:1680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1216
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1076
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:620
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:320
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1572
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
PID:1012
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:520 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:2016
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1496
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1096
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2032
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:292 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1320 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1704 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:968
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1160
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1700
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:1596
-
-
-
C:\Program Files\Common Files\System\de-DE\System Restore.exe"C:\Program Files\Common Files\System\de-DE\System Restore.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:2040
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1176
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1340
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1932
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:488
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:832
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1964
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:436
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:608
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:604
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1636
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
PID:1684
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1196
-
-
C:\Program Files\Microsoft Games\update.exe"C:\Program Files\Microsoft Games\update.exe" C:\Program Files\Microsoft Games\5⤵PID:292
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:968
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:928 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1084
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:528
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:568
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1420
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1728
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1708
-
-
-
C:\Users\update.exeC:\Users\update.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:604
-
-
C:\Users\Admin\Desktop\update.exeC:\Users\Admin\Desktop\update.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:684
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1932
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1668
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1456 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:584
-
-
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵
- Suspicious use of SetWindowsHookEx
PID:964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:316
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1804
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD5d2fc1ba133a56092fa41bc0b544b72ab
SHA15694c5d1c2b9a984551c830474120d53c3f0cfb4
SHA256f86d903644293af11d4fedf901a36104055e8c1505bf8a7a4d76acf9339a6efc
SHA512be8ea2ef73a954f43a31747607b9b39994da45d1100a4e07089eeb2ccfb9a240154c811e30f8bf02f13fccf7025d944448e95e96c5a13c027b079f10617e2d18
-
Filesize
72KB
MD5d2fc1ba133a56092fa41bc0b544b72ab
SHA15694c5d1c2b9a984551c830474120d53c3f0cfb4
SHA256f86d903644293af11d4fedf901a36104055e8c1505bf8a7a4d76acf9339a6efc
SHA512be8ea2ef73a954f43a31747607b9b39994da45d1100a4e07089eeb2ccfb9a240154c811e30f8bf02f13fccf7025d944448e95e96c5a13c027b079f10617e2d18
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD549a4821b5d0ad479f324ace326ee267a
SHA1f1e14f9b118b83bc7dbe9dd79d847f850881310a
SHA2562011c27c5e3f33ad423376019c567d6b716e8fb7dd46ee129b07e5dfcaf8d545
SHA51237ba2abb57fd08b3a102dd433a89718db43c22b0226d9b23ef4fd34757b13bc947344587c58f82bb470f7479d2aa6964a3e450d7b4cc91a29a27f077c4b33c88
-
Filesize
72KB
MD549a4821b5d0ad479f324ace326ee267a
SHA1f1e14f9b118b83bc7dbe9dd79d847f850881310a
SHA2562011c27c5e3f33ad423376019c567d6b716e8fb7dd46ee129b07e5dfcaf8d545
SHA51237ba2abb57fd08b3a102dd433a89718db43c22b0226d9b23ef4fd34757b13bc947344587c58f82bb470f7479d2aa6964a3e450d7b4cc91a29a27f077c4b33c88
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD5a2fe1bd32bf196e054711ebd52c06b97
SHA1a38f96b2b976c090ff0b0280cb253172c73d88b1
SHA256abc59c6a40ff7aaf06a068cab35deb56bb268165403cfec4b7bdb78725555da1
SHA51212d06afd692efabebad8f8df5269f66f288be4f53033d7a746b6ceb6174848473b7d0083c103e7eaed93a9db71849583d269934d692721ea098819ad00f170e7
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD5e942c2ca1e6e3dd85d92ccfbd622808d
SHA119d92c733812b24363e00b99eec77871ee7baa16
SHA256f86529c1c693c01c5c53dd87b7d483a5066e795c4cc36cd9d3eb49568a814969
SHA5126d682a12b1481a9e817cb70d4b16f3776be3c4ba68f9bffd28cf99c158ff247514a1a321fa2f4c2f15283699ec60b22356ce365242209e5d97441f4243f4ac72
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD560154c95f65c79943f6fd600f23eec5a
SHA11aee70f16ed9cdbf6564dad87d68a3e97920eb72
SHA2568a4b01afd54d8caf99ea9e5b677796eac7849866f53fa12d51a1fd1d3754a8e0
SHA51211fbff785d6d83e52b2216e6df5710a6ea7a4c35644aab7a1b67c010138e8a61db9bcaafaea2cc6fd6f06d11f4f202a470967d22d50d017742544dc5c8d72a4a
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD5a96472a9f70b1225f7fb01931361f1fb
SHA17fd8167ae8f796f735b801bb5b27ef0dd07c5e0b
SHA2565aeb71ac22a8291bf0e55531dc373a56376169a90dfd80ef4403c9c4f60b69e2
SHA5127c113a0b2d4c4c9e9d04fd59b5bce167a41b33d0f9662ff42fa7dcb08d478ccf0ad5bdbb1df7e1fd3dca363b397325fa755f66dbf81a4d4cd00f13c23dd49b40
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD591bbc738bb7bf3f72c7394a2d04033b8
SHA110d61a67a3ce495e537bb205221f92043b614c56
SHA256dd22f99ea4a51b1a7010c630c77730f75210635d6cb89b743848d884b95742a1
SHA512bfda8b5f798393c2397fcd025326a629be5fa74178ceb5181617109fe683033aeca73dc8ea7c60fd483e4666560cd60a4a9b49e95eafaf33bcf539fb7c04ead7
-
Filesize
72KB
MD5d2fc1ba133a56092fa41bc0b544b72ab
SHA15694c5d1c2b9a984551c830474120d53c3f0cfb4
SHA256f86d903644293af11d4fedf901a36104055e8c1505bf8a7a4d76acf9339a6efc
SHA512be8ea2ef73a954f43a31747607b9b39994da45d1100a4e07089eeb2ccfb9a240154c811e30f8bf02f13fccf7025d944448e95e96c5a13c027b079f10617e2d18
-
Filesize
72KB
MD5d2fc1ba133a56092fa41bc0b544b72ab
SHA15694c5d1c2b9a984551c830474120d53c3f0cfb4
SHA256f86d903644293af11d4fedf901a36104055e8c1505bf8a7a4d76acf9339a6efc
SHA512be8ea2ef73a954f43a31747607b9b39994da45d1100a4e07089eeb2ccfb9a240154c811e30f8bf02f13fccf7025d944448e95e96c5a13c027b079f10617e2d18
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951
-
Filesize
72KB
MD5137028b0e963417309e04a7c3fc4706b
SHA114b05a690d456a52b904f5f8f714a10df9e15819
SHA256426d95081b82ab10dad985585402b1e363253e0f5b0f3b5a3ab823881242ce22
SHA512193768dffd6176ff08c8302a84f6d0b61863147927c44c2e1e0778120aa31e8882d65ab5851bc4a5312b0dce6d86785e052f331707170fc09960abaec340d951