Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe
Resource
win10v2004-20221111-en
General
-
Target
c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe
-
Size
72KB
-
MD5
090973f19e48c6baac018379afdc3c63
-
SHA1
86a75efee06c05ad97c5bc434bc356a5d46d17ec
-
SHA256
c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007
-
SHA512
567e2a7e6e572ef87d3325a507bde79444a972820a862f797d62c6b7004ca811ac56f4ee774b9e4082a0977e58e9d43d470be272bb0eb2eee3661321aed0da5b
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf25:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPt
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 45 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 588 backup.exe 1160 backup.exe 468 backup.exe 1164 update.exe 784 backup.exe 1552 update.exe 612 backup.exe 1824 backup.exe 1460 backup.exe 1020 backup.exe 1496 backup.exe 1328 backup.exe 1660 data.exe 1452 backup.exe 1712 backup.exe 1612 backup.exe 956 backup.exe 584 backup.exe 1288 backup.exe 1928 backup.exe 384 backup.exe 1884 backup.exe 916 backup.exe 1128 backup.exe 1536 backup.exe 2044 backup.exe 1212 backup.exe 1640 backup.exe 1252 System Restore.exe 1144 backup.exe 1632 backup.exe 280 backup.exe 936 backup.exe 700 backup.exe 1548 backup.exe 1404 backup.exe 1764 backup.exe 1328 backup.exe 1324 backup.exe 616 backup.exe 1432 backup.exe 676 update.exe 544 data.exe 896 backup.exe 1504 backup.exe 1588 backup.exe 1160 backup.exe 840 System Restore.exe 636 update.exe 692 data.exe 760 backup.exe 1040 backup.exe 532 backup.exe 1824 backup.exe 1964 backup.exe 1072 backup.exe 2044 backup.exe 1968 backup.exe 1948 backup.exe 900 backup.exe 584 backup.exe 1592 backup.exe 1128 backup.exe 628 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 1164 update.exe 1164 update.exe 1164 update.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 1552 update.exe 1552 update.exe 1552 update.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 612 backup.exe 612 backup.exe 1460 backup.exe 1460 backup.exe 612 backup.exe 612 backup.exe 1496 backup.exe 1496 backup.exe 1328 backup.exe 1328 backup.exe 1496 backup.exe 1496 backup.exe 1452 backup.exe 1452 backup.exe 1712 backup.exe 1712 backup.exe 1712 backup.exe 1712 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 956 backup.exe 1712 backup.exe 1712 backup.exe 1496 backup.exe 1496 backup.exe -
Drops file in Program Files directory 55 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\update.exe System Restore.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\data.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\update.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\data.exe backup.exe File opened for modification C:\Windows\addins\backup.exe data.exe File opened for modification C:\Windows\AppCompat\backup.exe data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe -
Suspicious use of SetWindowsHookEx 58 IoCs
pid Process 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 588 backup.exe 1160 backup.exe 468 backup.exe 1164 update.exe 784 backup.exe 1552 update.exe 612 backup.exe 1824 backup.exe 1460 backup.exe 1020 backup.exe 1496 backup.exe 1328 backup.exe 1660 data.exe 1452 backup.exe 1712 backup.exe 1612 backup.exe 956 backup.exe 584 backup.exe 1288 backup.exe 1928 backup.exe 384 backup.exe 1884 backup.exe 916 backup.exe 1128 backup.exe 1536 backup.exe 2044 backup.exe 1212 backup.exe 1640 backup.exe 1252 System Restore.exe 1144 backup.exe 280 backup.exe 1632 backup.exe 936 backup.exe 1764 backup.exe 1404 backup.exe 1324 backup.exe 616 backup.exe 700 backup.exe 1328 backup.exe 1548 backup.exe 1432 backup.exe 1588 backup.exe 896 backup.exe 1504 backup.exe 840 System Restore.exe 544 data.exe 676 update.exe 1160 backup.exe 692 data.exe 760 backup.exe 532 backup.exe 1968 backup.exe 1964 backup.exe 1072 backup.exe 1824 backup.exe 1592 backup.exe 900 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 588 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 28 PID 2036 wrote to memory of 588 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 28 PID 2036 wrote to memory of 588 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 28 PID 2036 wrote to memory of 588 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 28 PID 2036 wrote to memory of 1160 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 29 PID 2036 wrote to memory of 1160 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 29 PID 2036 wrote to memory of 1160 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 29 PID 2036 wrote to memory of 1160 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 29 PID 2036 wrote to memory of 468 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 30 PID 2036 wrote to memory of 468 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 30 PID 2036 wrote to memory of 468 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 30 PID 2036 wrote to memory of 468 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 30 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 1164 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 31 PID 2036 wrote to memory of 784 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 32 PID 2036 wrote to memory of 784 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 32 PID 2036 wrote to memory of 784 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 32 PID 2036 wrote to memory of 784 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 32 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 2036 wrote to memory of 1552 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 33 PID 588 wrote to memory of 612 588 backup.exe 35 PID 588 wrote to memory of 612 588 backup.exe 35 PID 588 wrote to memory of 612 588 backup.exe 35 PID 588 wrote to memory of 612 588 backup.exe 35 PID 2036 wrote to memory of 1824 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 34 PID 2036 wrote to memory of 1824 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 34 PID 2036 wrote to memory of 1824 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 34 PID 2036 wrote to memory of 1824 2036 c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe 34 PID 612 wrote to memory of 1460 612 backup.exe 36 PID 612 wrote to memory of 1460 612 backup.exe 36 PID 612 wrote to memory of 1460 612 backup.exe 36 PID 612 wrote to memory of 1460 612 backup.exe 36 PID 1460 wrote to memory of 1020 1460 backup.exe 37 PID 1460 wrote to memory of 1020 1460 backup.exe 37 PID 1460 wrote to memory of 1020 1460 backup.exe 37 PID 1460 wrote to memory of 1020 1460 backup.exe 37 PID 612 wrote to memory of 1496 612 backup.exe 38 PID 612 wrote to memory of 1496 612 backup.exe 38 PID 612 wrote to memory of 1496 612 backup.exe 38 PID 612 wrote to memory of 1496 612 backup.exe 38 PID 1496 wrote to memory of 1328 1496 backup.exe 39 PID 1496 wrote to memory of 1328 1496 backup.exe 39 PID 1496 wrote to memory of 1328 1496 backup.exe 39 PID 1496 wrote to memory of 1328 1496 backup.exe 39 PID 1328 wrote to memory of 1660 1328 backup.exe 40 PID 1328 wrote to memory of 1660 1328 backup.exe 40 PID 1328 wrote to memory of 1660 1328 backup.exe 40 PID 1328 wrote to memory of 1660 1328 backup.exe 40 PID 1496 wrote to memory of 1452 1496 backup.exe 41 PID 1496 wrote to memory of 1452 1496 backup.exe 41 PID 1496 wrote to memory of 1452 1496 backup.exe 41 PID 1496 wrote to memory of 1452 1496 backup.exe 41 PID 1452 wrote to memory of 1712 1452 backup.exe 42 PID 1452 wrote to memory of 1712 1452 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe"C:\Users\Admin\AppData\Local\Temp\c96cc39b4c554b7f480fc50744d12e6dea1fc5e1501aabf0e27d67adea682007.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3366554330\backup.exeC:\Users\Admin\AppData\Local\Temp\3366554330\backup.exe C:\Users\Admin\AppData\Local\Temp\3366554330\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:588 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:612 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1460 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1496 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1328 -
C:\Program Files\7-Zip\Lang\data.exe"C:\Program Files\7-Zip\Lang\data.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1452 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:384
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1884
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
PID:636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:1828
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:1648
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
PID:1040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Executes dropped EXE
PID:628
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1644
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1544
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1328 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:760
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Executes dropped EXE
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1460
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1144 -
C:\Program Files\DVD Maker\de-DE\System Restore.exe"C:\Program Files\DVD Maker\de-DE\System Restore.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:840
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:532
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:868
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1416
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:700 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
PID:2044
-
-
-
C:\Program Files\Internet Explorer\update.exe"C:\Program Files\Internet Explorer\update.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:676 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
PID:1128
-
-
C:\Program Files\Internet Explorer\es-ES\data.exe"C:\Program Files\Internet Explorer\es-ES\data.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1880
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:832
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1552
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵PID:1888
-
-
-
C:\Program Files (x86)\Common Files\data.exe"C:\Program Files (x86)\Common Files\data.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:544 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:1148
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:592
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1592
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1704
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:616 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1192
-
-
-
C:\Windows\data.exeC:\Windows\data.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:692 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
PID:1948
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1588
-
-
C:\Windows\AppPatch\data.exeC:\Windows\AppPatch\data.exe C:\Windows\AppPatch\5⤵PID:1940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5874a3ee6f032f93795dbafde7df7ae9e
SHA13ec2fd462919b1233ac0e9d65ed395eaba1dda2a
SHA256507848fc2de4d66e4dbeac92b51556758904568269e3c359230599f2c462d3ea
SHA5124d572ffbfc48f6abc0495351b3690474315e6aa15c8f1d5593ec3c7e9949b91e0859e55b731178d5727e397d090b0b97528e8e51f918ed3f6d956ca77c842a95
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD5618efc0289f7155a367dd299879c2622
SHA1e7352fac2cb5eebbe8c67bcc5da8cbd8f203a8ac
SHA25685b89cbce36d7689d73541e0e6b8e7f4f2adbf6890df208d892b065ce5e06559
SHA51260a0986fa81eb75b95e615b232425716c13b408698b4820f38897465dba98b4dddbf964ec94555bf94fe9d14e6b2f2443d18ac383b32926fbdf3a4340a771dec
-
Filesize
72KB
MD5618efc0289f7155a367dd299879c2622
SHA1e7352fac2cb5eebbe8c67bcc5da8cbd8f203a8ac
SHA25685b89cbce36d7689d73541e0e6b8e7f4f2adbf6890df208d892b065ce5e06559
SHA51260a0986fa81eb75b95e615b232425716c13b408698b4820f38897465dba98b4dddbf964ec94555bf94fe9d14e6b2f2443d18ac383b32926fbdf3a4340a771dec
-
Filesize
72KB
MD5874a3ee6f032f93795dbafde7df7ae9e
SHA13ec2fd462919b1233ac0e9d65ed395eaba1dda2a
SHA256507848fc2de4d66e4dbeac92b51556758904568269e3c359230599f2c462d3ea
SHA5124d572ffbfc48f6abc0495351b3690474315e6aa15c8f1d5593ec3c7e9949b91e0859e55b731178d5727e397d090b0b97528e8e51f918ed3f6d956ca77c842a95
-
Filesize
72KB
MD5874a3ee6f032f93795dbafde7df7ae9e
SHA13ec2fd462919b1233ac0e9d65ed395eaba1dda2a
SHA256507848fc2de4d66e4dbeac92b51556758904568269e3c359230599f2c462d3ea
SHA5124d572ffbfc48f6abc0495351b3690474315e6aa15c8f1d5593ec3c7e9949b91e0859e55b731178d5727e397d090b0b97528e8e51f918ed3f6d956ca77c842a95
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD55b923376638a55798214524efbf7ee0c
SHA1833dbf4c30881924cb72e50dad3fbe52bc029c79
SHA256c69d8b81141e2ebfd0923b6f7fa1097d09bba89cad8d8b0d934ab365e744b4ca
SHA5129717fdab134beee17e8a20a2d4f48a4efde9ae2cf6768c2f2a86dc28c024eb22b66cf510051da5da787879552de09f83543d3745b00737a2d7a877f427aeaa38
-
Filesize
72KB
MD59a8a51ca48deb6a67bd77d5e9a7ff808
SHA1158f09bc738894455ea43ffe31129d195f00ad8b
SHA2566307793b18146630463491a7925b10b5fcef82f568db7dc4b827c0662bd572d3
SHA512f1be1829c98cc7b81b97f8109377a403d73e67e821d63247be076f77f20ad74754ea91dbd2f250aaa21c16988afcec069526e9973c65f6610eb7f51554be8f89
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD54a9094c88694975697eb09e931be0307
SHA145f943d4dd35aa5322715105ef3bdbc88db13861
SHA25609d597cc2f1d699f68ffb5866a1209b5be0c71adbe1a5e2c94e769122a3e3b6d
SHA512c897c13376d9eef032a366b912a149141a84274c01c9ccc94704348db626c38a5bb7644a9725ea6c40f89ee3d6b4f44cbbf3ac5546c025bf42d1690e60009598
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5931c732daa177226be574fb17bf0559b
SHA1d93329af7a1452f118a21add917f81e86fe762ee
SHA256f7548c80ce9cf9bafed74d506fe9619b794daf1bd4056b53269734214c15660b
SHA512c46209aaa1b3048c9470fdb9b0875eb48cc3dca43c918d4a29b7d58a903e99a5ce7b5c27f1ee847e51c3bfba9cad84338ddf323a0a714cde3e183f7edebce031
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5e890061053a6052625a461ec26739da3
SHA141d91e964fbb8414c810402676337a335cf7fe90
SHA256c1bbd9a5b8c0c453181ca381b3f97a2a86d6a7cd4dc08fcb4bd7942e9d8db93b
SHA512ea13ff294a5cde6511c949126b3683edfb2fe8801daaa81aadaee045ee1ede917e115847910c897c696272fd096ac1b55eeea4549cd0775de0516e8401e782e1
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\update.exe
Filesize72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD5bad0f79ffb406fc73d236c512902664b
SHA1be6ea3280a0d2264e3d4ec04a1a1c56166f8afce
SHA256acd7f3833fd37670caab639cc12bc610ad109cdc8720b4a61b3655816d0c819f
SHA5122f5394ed519ba1834bd6d0418209bc5a469d7064391822452cffbbc2803ad3909c407593dce42a430a98f1776311ac730cccc7183c14925dc477e2e7bf362752
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa
-
Filesize
72KB
MD544377fcfc4a3415755b320d06f840922
SHA135c99aae698c206c0786fd436b974517023c8aa3
SHA2568d0db6e4426f25e0df70cd2edfef98aca16a8e666b1d25e9b99d2c2e14bfaf67
SHA512635964b1ea9214ee7048045d4933f6126d566660cc1e20dd417e109db55719e7c6173ccbd06479d3e3e75293f12cfbabf661c8e9661a5206fafa97e02456e8aa