Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
258s -
max time network
333s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe
Resource
win10v2004-20220901-en
General
-
Target
c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe
-
Size
72KB
-
MD5
157237a129b557d08c1f1be3465f1718
-
SHA1
6bd91ccbc3b278c46a7d01a103df96cf25241e6e
-
SHA256
c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237
-
SHA512
983a895884f6be31776e573c7c728d8bb23727fdcc9e8e8d8a59f44551fe89cfe77ce7d7a6def82782a28133e45844355892fc91a99cb1f03b1b8912945b600a
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2L:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPf
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 50 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 436 backup.exe 1684 backup.exe 788 backup.exe 1688 backup.exe 1388 backup.exe 872 backup.exe 2000 backup.exe 1224 backup.exe 840 backup.exe 1964 backup.exe 768 backup.exe 1332 backup.exe 1744 backup.exe 868 backup.exe 956 backup.exe 616 update.exe 1608 backup.exe 1280 backup.exe 1132 backup.exe 916 backup.exe 1716 backup.exe 1688 backup.exe 1896 backup.exe 1068 backup.exe 872 backup.exe 1408 backup.exe 1768 backup.exe 1000 backup.exe 1036 backup.exe 764 backup.exe 1192 backup.exe 1900 backup.exe 552 backup.exe 932 backup.exe 1332 backup.exe 1744 backup.exe 1540 backup.exe 316 backup.exe 1316 backup.exe 1804 backup.exe 1764 backup.exe 576 backup.exe 616 backup.exe 1732 backup.exe 1720 backup.exe 1724 update.exe 772 backup.exe 1696 backup.exe 1688 backup.exe 584 backup.exe 2004 backup.exe 1660 backup.exe 1760 backup.exe 1400 backup.exe 1828 backup.exe 1160 backup.exe 1556 backup.exe 240 backup.exe 1684 backup.exe 1028 backup.exe 1876 backup.exe 1788 backup.exe 932 backup.exe 1516 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 1224 backup.exe 1224 backup.exe 840 backup.exe 840 backup.exe 1224 backup.exe 1224 backup.exe 768 backup.exe 768 backup.exe 1332 backup.exe 1332 backup.exe 768 backup.exe 768 backup.exe 868 backup.exe 868 backup.exe 956 backup.exe 616 update.exe 616 update.exe 616 update.exe 956 backup.exe 956 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 956 backup.exe 956 backup.exe 1608 backup.exe 868 backup.exe 868 backup.exe 768 backup.exe 768 backup.exe 1224 backup.exe 1224 backup.exe 1608 backup.exe 956 backup.exe 868 backup.exe 956 backup.exe 868 backup.exe 768 backup.exe 1224 backup.exe -
Drops file in Program Files directory 57 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 436 backup.exe 1684 backup.exe 788 backup.exe 1688 backup.exe 1388 backup.exe 872 backup.exe 2000 backup.exe 1224 backup.exe 840 backup.exe 1964 backup.exe 768 backup.exe 1332 backup.exe 1744 backup.exe 868 backup.exe 956 backup.exe 616 update.exe 1608 backup.exe 1280 backup.exe 1132 backup.exe 916 backup.exe 1716 backup.exe 1688 backup.exe 1896 backup.exe 1068 backup.exe 872 backup.exe 1000 backup.exe 1036 backup.exe 1408 backup.exe 1768 backup.exe 1192 backup.exe 1900 backup.exe 764 backup.exe 552 backup.exe 932 backup.exe 316 backup.exe 1540 backup.exe 1332 backup.exe 1744 backup.exe 616 backup.exe 576 backup.exe 1804 backup.exe 1764 backup.exe 1316 backup.exe 1732 backup.exe 1720 backup.exe 1724 update.exe 1696 backup.exe 772 backup.exe 1160 backup.exe 1828 backup.exe 1400 backup.exe 584 backup.exe 1688 backup.exe 1760 backup.exe 1660 backup.exe 2004 backup.exe 1556 backup.exe 240 backup.exe 1684 backup.exe 932 backup.exe 1788 backup.exe 1876 backup.exe 1576 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 436 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 28 PID 1032 wrote to memory of 436 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 28 PID 1032 wrote to memory of 436 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 28 PID 1032 wrote to memory of 436 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 28 PID 1032 wrote to memory of 1684 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 29 PID 1032 wrote to memory of 1684 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 29 PID 1032 wrote to memory of 1684 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 29 PID 1032 wrote to memory of 1684 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 29 PID 1032 wrote to memory of 788 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 30 PID 1032 wrote to memory of 788 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 30 PID 1032 wrote to memory of 788 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 30 PID 1032 wrote to memory of 788 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 30 PID 1032 wrote to memory of 1688 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 31 PID 1032 wrote to memory of 1688 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 31 PID 1032 wrote to memory of 1688 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 31 PID 1032 wrote to memory of 1688 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 31 PID 1032 wrote to memory of 1388 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 32 PID 1032 wrote to memory of 1388 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 32 PID 1032 wrote to memory of 1388 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 32 PID 1032 wrote to memory of 1388 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 32 PID 1032 wrote to memory of 872 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 33 PID 1032 wrote to memory of 872 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 33 PID 1032 wrote to memory of 872 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 33 PID 1032 wrote to memory of 872 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 33 PID 1032 wrote to memory of 2000 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 34 PID 1032 wrote to memory of 2000 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 34 PID 1032 wrote to memory of 2000 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 34 PID 1032 wrote to memory of 2000 1032 c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe 34 PID 436 wrote to memory of 1224 436 backup.exe 35 PID 436 wrote to memory of 1224 436 backup.exe 35 PID 436 wrote to memory of 1224 436 backup.exe 35 PID 436 wrote to memory of 1224 436 backup.exe 35 PID 1224 wrote to memory of 840 1224 backup.exe 36 PID 1224 wrote to memory of 840 1224 backup.exe 36 PID 1224 wrote to memory of 840 1224 backup.exe 36 PID 1224 wrote to memory of 840 1224 backup.exe 36 PID 840 wrote to memory of 1964 840 backup.exe 37 PID 840 wrote to memory of 1964 840 backup.exe 37 PID 840 wrote to memory of 1964 840 backup.exe 37 PID 840 wrote to memory of 1964 840 backup.exe 37 PID 1224 wrote to memory of 768 1224 backup.exe 38 PID 1224 wrote to memory of 768 1224 backup.exe 38 PID 1224 wrote to memory of 768 1224 backup.exe 38 PID 1224 wrote to memory of 768 1224 backup.exe 38 PID 768 wrote to memory of 1332 768 backup.exe 39 PID 768 wrote to memory of 1332 768 backup.exe 39 PID 768 wrote to memory of 1332 768 backup.exe 39 PID 768 wrote to memory of 1332 768 backup.exe 39 PID 1332 wrote to memory of 1744 1332 backup.exe 40 PID 1332 wrote to memory of 1744 1332 backup.exe 40 PID 1332 wrote to memory of 1744 1332 backup.exe 40 PID 1332 wrote to memory of 1744 1332 backup.exe 40 PID 768 wrote to memory of 868 768 backup.exe 41 PID 768 wrote to memory of 868 768 backup.exe 41 PID 768 wrote to memory of 868 768 backup.exe 41 PID 768 wrote to memory of 868 768 backup.exe 41 PID 868 wrote to memory of 956 868 backup.exe 42 PID 868 wrote to memory of 956 868 backup.exe 42 PID 868 wrote to memory of 956 868 backup.exe 42 PID 868 wrote to memory of 956 868 backup.exe 42 PID 956 wrote to memory of 616 956 backup.exe 43 PID 956 wrote to memory of 616 956 backup.exe 43 PID 956 wrote to memory of 616 956 backup.exe 43 PID 956 wrote to memory of 616 956 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe"C:\Users\Admin\AppData\Local\Temp\c34343de2dd4d5840c39df9f3529052833bc2e9879b54ddd2ab184a54ad91237.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\765143526\backup.exeC:\Users\Admin\AppData\Local\Temp\765143526\backup.exe C:\Users\Admin\AppData\Local\Temp\765143526\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:436 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1224 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:840 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:768 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:868 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:956 -
C:\Program Files\Common Files\Microsoft Shared\Filters\update.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\update.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:1592
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:552 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1720
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1400
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:764 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:316 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1708
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768 -
C:\Program Files\DVD Maker\de-DE\update.exe"C:\Program Files\DVD Maker\de-DE\update.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:772
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1968
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1332 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1828
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1116
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1552
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1036 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1804 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:580
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:1516
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1888
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1316 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
PID:1028
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1676
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1812
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD55c5b5e93e948ffb869fb85fffd22b530
SHA11da1e96a70fc49caf843cf18cc06d51cc60b89d9
SHA256c287a6f8b6e64cac7288aeeb4cb14101facc1c5313c901eaa6c36d9659609017
SHA512db03cc110774657bb69b7616a1e5637043c76533b511e06914605ed0ccddae4ac563c394e162e57024709fbc8108f16a9adf60ffa70b57c23b58768a5e229962
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD5b1874572f49cb5ae7291f8a2e5cda44c
SHA1bbc1ac49710492a743fcd4c3274be58839d989b2
SHA256c6769e771710f62030252ee83c832945b6cfbd2a8bd827803802859e665112ab
SHA512ad085eac93e0bc3071a62134bbb4a5d9495782a5e9b4f1e102e895d32b3311cc0bd2068eda3c64c1c3b71e4c4f920defc2927ac66d316c3a5d28639e7fbc77c3
-
Filesize
72KB
MD5b1874572f49cb5ae7291f8a2e5cda44c
SHA1bbc1ac49710492a743fcd4c3274be58839d989b2
SHA256c6769e771710f62030252ee83c832945b6cfbd2a8bd827803802859e665112ab
SHA512ad085eac93e0bc3071a62134bbb4a5d9495782a5e9b4f1e102e895d32b3311cc0bd2068eda3c64c1c3b71e4c4f920defc2927ac66d316c3a5d28639e7fbc77c3
-
Filesize
72KB
MD5a0b83221c38e9ce42e367298ae19e153
SHA1ff34b52a846dc2b97f4a5d78e156074eb61ac4fd
SHA256736f8a06b70464e23522235fff8d188e7676e25af75d04cc17ea112603fb06fd
SHA512e7430305873b5718eab9aa3f2c2f2c4376dd9a8a5a4efcb9ba5ccb1d30b302168951ac1fc6d14495d559a076b454a248fe6f99a69c0dd1cf67defc8a151ab5ce
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD543cc05e0873995e9ab38d274891d8ed3
SHA1df99ff113c1ebf63d753febeea1438c6e496cd20
SHA2561589103a60fe0d4277e48a5b1e1d14ebb75166a664ccc220cdaa8a91f7e092ca
SHA512949a16bfd94120de87446db6a97c7cdc089217cad775323c65567aa7bea87efa0a37bebbbb180452b6febf7cac7ef72145ec01065ab332872fce4734cebc1efc
-
Filesize
72KB
MD543cc05e0873995e9ab38d274891d8ed3
SHA1df99ff113c1ebf63d753febeea1438c6e496cd20
SHA2561589103a60fe0d4277e48a5b1e1d14ebb75166a664ccc220cdaa8a91f7e092ca
SHA512949a16bfd94120de87446db6a97c7cdc089217cad775323c65567aa7bea87efa0a37bebbbb180452b6febf7cac7ef72145ec01065ab332872fce4734cebc1efc
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD599ba22dc4ff7213c209ca79d58df83f6
SHA12c76cb17cdf036b75a6f60f32f07f43d261d6dbd
SHA256598ccec4e346d0076a73668bf7b281a701874fae74eeb51128f7982f5b414336
SHA512f9768811219752b79cabe3cd55444cd80eb9006d0d2c7783f42f0c7ba6a391add7280682d0b435bc2816277a80d19b3791bdbac4b2aed792249f2e558438c65e
-
Filesize
72KB
MD599ba22dc4ff7213c209ca79d58df83f6
SHA12c76cb17cdf036b75a6f60f32f07f43d261d6dbd
SHA256598ccec4e346d0076a73668bf7b281a701874fae74eeb51128f7982f5b414336
SHA512f9768811219752b79cabe3cd55444cd80eb9006d0d2c7783f42f0c7ba6a391add7280682d0b435bc2816277a80d19b3791bdbac4b2aed792249f2e558438c65e
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD55c5b5e93e948ffb869fb85fffd22b530
SHA11da1e96a70fc49caf843cf18cc06d51cc60b89d9
SHA256c287a6f8b6e64cac7288aeeb4cb14101facc1c5313c901eaa6c36d9659609017
SHA512db03cc110774657bb69b7616a1e5637043c76533b511e06914605ed0ccddae4ac563c394e162e57024709fbc8108f16a9adf60ffa70b57c23b58768a5e229962
-
Filesize
72KB
MD55c5b5e93e948ffb869fb85fffd22b530
SHA11da1e96a70fc49caf843cf18cc06d51cc60b89d9
SHA256c287a6f8b6e64cac7288aeeb4cb14101facc1c5313c901eaa6c36d9659609017
SHA512db03cc110774657bb69b7616a1e5637043c76533b511e06914605ed0ccddae4ac563c394e162e57024709fbc8108f16a9adf60ffa70b57c23b58768a5e229962
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD5b1874572f49cb5ae7291f8a2e5cda44c
SHA1bbc1ac49710492a743fcd4c3274be58839d989b2
SHA256c6769e771710f62030252ee83c832945b6cfbd2a8bd827803802859e665112ab
SHA512ad085eac93e0bc3071a62134bbb4a5d9495782a5e9b4f1e102e895d32b3311cc0bd2068eda3c64c1c3b71e4c4f920defc2927ac66d316c3a5d28639e7fbc77c3
-
Filesize
72KB
MD5b1874572f49cb5ae7291f8a2e5cda44c
SHA1bbc1ac49710492a743fcd4c3274be58839d989b2
SHA256c6769e771710f62030252ee83c832945b6cfbd2a8bd827803802859e665112ab
SHA512ad085eac93e0bc3071a62134bbb4a5d9495782a5e9b4f1e102e895d32b3311cc0bd2068eda3c64c1c3b71e4c4f920defc2927ac66d316c3a5d28639e7fbc77c3
-
Filesize
72KB
MD5a0b83221c38e9ce42e367298ae19e153
SHA1ff34b52a846dc2b97f4a5d78e156074eb61ac4fd
SHA256736f8a06b70464e23522235fff8d188e7676e25af75d04cc17ea112603fb06fd
SHA512e7430305873b5718eab9aa3f2c2f2c4376dd9a8a5a4efcb9ba5ccb1d30b302168951ac1fc6d14495d559a076b454a248fe6f99a69c0dd1cf67defc8a151ab5ce
-
Filesize
72KB
MD5a0b83221c38e9ce42e367298ae19e153
SHA1ff34b52a846dc2b97f4a5d78e156074eb61ac4fd
SHA256736f8a06b70464e23522235fff8d188e7676e25af75d04cc17ea112603fb06fd
SHA512e7430305873b5718eab9aa3f2c2f2c4376dd9a8a5a4efcb9ba5ccb1d30b302168951ac1fc6d14495d559a076b454a248fe6f99a69c0dd1cf67defc8a151ab5ce
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD52975db2c8dcb37f71ec29080c4c37a40
SHA164fae06bfda1eb3c15181473e801611a1c333559
SHA25600cb29842c52358e319e369a5b88e06b367863a0133e961a2e0b5f9ee8741bab
SHA51227788ba56afd4a7023f367d74c5810df9ac79eb4e1f39e59767f70d16710ca602af2bfbbcc2dbedf86890eb76a167e05afefd9c7f15ae60930e8b6af731e6127
-
Filesize
72KB
MD5a0b83221c38e9ce42e367298ae19e153
SHA1ff34b52a846dc2b97f4a5d78e156074eb61ac4fd
SHA256736f8a06b70464e23522235fff8d188e7676e25af75d04cc17ea112603fb06fd
SHA512e7430305873b5718eab9aa3f2c2f2c4376dd9a8a5a4efcb9ba5ccb1d30b302168951ac1fc6d14495d559a076b454a248fe6f99a69c0dd1cf67defc8a151ab5ce
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5f9d6def5af42087c5af8c91b9852d74e
SHA1f518f13dd8d656cf05680a04d07cdb1bf4ba47dc
SHA256ebb08c2369f8115937e36aebbe8f26374cef99244c70795cdf8b2f35f58fa568
SHA512e868fc76936011cd3481db062562bbd935d3d6129f9c12f9d0f7258ed3f2684a21eaf685cda26a12c7e54d59553dd4a92469348b108a605505971c5745f72fdb
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD5996648782fa0eb88d7e9ff480fb57555
SHA1da3a244c1754afdc11fb2ce9f50c17419373b1ee
SHA256031553e8027ed1c3ef52db2e7c7350fdff8b715bc692b4141aaf11c987650df1
SHA512aa281abf2548df2b20f0833d48d457e88df7eaa03bd8c47f8c9935be5134f45eaef303204b0a73ebb5193ac1e9380eae86ee902d73af5d141bbef68363da65d8
-
Filesize
72KB
MD543cc05e0873995e9ab38d274891d8ed3
SHA1df99ff113c1ebf63d753febeea1438c6e496cd20
SHA2561589103a60fe0d4277e48a5b1e1d14ebb75166a664ccc220cdaa8a91f7e092ca
SHA512949a16bfd94120de87446db6a97c7cdc089217cad775323c65567aa7bea87efa0a37bebbbb180452b6febf7cac7ef72145ec01065ab332872fce4734cebc1efc
-
Filesize
72KB
MD543cc05e0873995e9ab38d274891d8ed3
SHA1df99ff113c1ebf63d753febeea1438c6e496cd20
SHA2561589103a60fe0d4277e48a5b1e1d14ebb75166a664ccc220cdaa8a91f7e092ca
SHA512949a16bfd94120de87446db6a97c7cdc089217cad775323c65567aa7bea87efa0a37bebbbb180452b6febf7cac7ef72145ec01065ab332872fce4734cebc1efc
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d
-
Filesize
72KB
MD562712b4c6f3e1db742586463dc16f2d9
SHA10674413e2a38d56a48d695a562b3761c49d46f15
SHA25683e5e99b265a2a6eb5f7ddc05966df41b506315c2cb15bc528bf7336c5e48658
SHA512b26e11988fbe4612f2378df1f9d242a5508b1f8a42dc195b9829fa8dbaeb9f4177d68c8cce3e4c187c1d4cf2e1748d3d64e3f617055c2133766e01b7584a0a8d