Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe
Resource
win10v2004-20221111-en
General
-
Target
6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe
-
Size
72KB
-
MD5
053b9fb28dd6098e6a960605bb5ab492
-
SHA1
f33cbe30d14c488b4b7aa8d90054a7a7353e54fc
-
SHA256
6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91
-
SHA512
a52d45165b25153a340ae7a4cd274c8762b2db0877c54d7698a86acfb12ed3f5b8d4835626941340d8e73a8840882c863299fbd7e81e1d2adbbe39a94018d076
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf27:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 53 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 832 backup.exe 2024 backup.exe 992 backup.exe 1176 backup.exe 676 data.exe 1356 backup.exe 824 backup.exe 1852 backup.exe 1244 backup.exe 1592 backup.exe 776 data.exe 1968 backup.exe 960 backup.exe 484 backup.exe 1624 backup.exe 952 backup.exe 1476 backup.exe 2032 backup.exe 2036 System Restore.exe 1172 backup.exe 1980 backup.exe 1424 backup.exe 1096 backup.exe 1348 backup.exe 1536 backup.exe 924 backup.exe 1416 backup.exe 1540 backup.exe 1620 backup.exe 1588 backup.exe 1996 update.exe 2000 backup.exe 432 backup.exe 1164 backup.exe 952 backup.exe 1272 backup.exe 1752 backup.exe 2020 backup.exe 2024 backup.exe 1980 backup.exe 1740 backup.exe 788 backup.exe 676 backup.exe 1652 backup.exe 1468 backup.exe 1748 backup.exe 1104 backup.exe 1488 backup.exe 844 backup.exe 1552 backup.exe 1696 backup.exe 296 backup.exe 1044 backup.exe 432 backup.exe 584 backup.exe 1128 backup.exe 1616 backup.exe 1940 backup.exe 1780 backup.exe 652 backup.exe 1824 backup.exe 1452 backup.exe 1960 backup.exe 1768 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 992 backup.exe 992 backup.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 676 data.exe 676 data.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 992 backup.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 992 backup.exe 1592 backup.exe 1592 backup.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 776 data.exe 776 data.exe 1592 backup.exe 1592 backup.exe 484 backup.exe 484 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1624 backup.exe 1592 backup.exe 992 backup.exe 1592 backup.exe 992 backup.exe 484 backup.exe 484 backup.exe 484 backup.exe 2036 System Restore.exe 484 backup.exe 1172 backup.exe 2036 System Restore.exe 2032 backup.exe 2032 backup.exe 1172 backup.exe 1424 backup.exe 1424 backup.exe 2036 System Restore.exe 1348 backup.exe 2036 System Restore.exe 1348 backup.exe 484 backup.exe 484 backup.exe 2036 System Restore.exe 2036 System Restore.exe 1540 backup.exe 1620 backup.exe 1620 backup.exe 2036 System Restore.exe 2036 System Restore.exe 1996 update.exe -
Drops file in Program Files directory 59 IoCs
description ioc Process File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe data.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\data.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 832 backup.exe 2024 backup.exe 992 backup.exe 1176 backup.exe 676 data.exe 1356 backup.exe 824 backup.exe 1852 backup.exe 1592 backup.exe 1244 backup.exe 776 data.exe 1968 backup.exe 960 backup.exe 484 backup.exe 1624 backup.exe 952 backup.exe 1776 backup.exe 1612 backup.exe 1660 backup.exe 2032 backup.exe 788 backup.exe 1172 backup.exe 2036 System Restore.exe 1980 backup.exe 1424 backup.exe 1348 backup.exe 1096 backup.exe 1852 backup.exe 1688 backup.exe 1416 backup.exe 924 backup.exe 1540 backup.exe 1620 backup.exe 1788 backup.exe 1588 backup.exe 964 update.exe 2000 backup.exe 432 backup.exe 1996 update.exe 1940 backup.exe 1164 backup.exe 1272 backup.exe 1144 backup.exe 952 backup.exe 364 backup.exe 1752 backup.exe 2020 backup.exe 2024 backup.exe 568 backup.exe 1980 backup.exe 1740 backup.exe 788 backup.exe 676 backup.exe 1748 backup.exe 1652 backup.exe 1488 backup.exe 1468 backup.exe 924 backup.exe 844 backup.exe 1696 backup.exe 1044 backup.exe 1552 backup.exe 432 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 832 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 28 PID 1292 wrote to memory of 832 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 28 PID 1292 wrote to memory of 832 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 28 PID 1292 wrote to memory of 832 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 28 PID 1292 wrote to memory of 2024 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 29 PID 1292 wrote to memory of 2024 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 29 PID 1292 wrote to memory of 2024 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 29 PID 1292 wrote to memory of 2024 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 29 PID 832 wrote to memory of 992 832 backup.exe 30 PID 832 wrote to memory of 992 832 backup.exe 30 PID 832 wrote to memory of 992 832 backup.exe 30 PID 832 wrote to memory of 992 832 backup.exe 30 PID 1292 wrote to memory of 1176 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 31 PID 1292 wrote to memory of 1176 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 31 PID 1292 wrote to memory of 1176 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 31 PID 1292 wrote to memory of 1176 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 31 PID 992 wrote to memory of 676 992 backup.exe 32 PID 992 wrote to memory of 676 992 backup.exe 32 PID 992 wrote to memory of 676 992 backup.exe 32 PID 992 wrote to memory of 676 992 backup.exe 32 PID 1292 wrote to memory of 1356 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 33 PID 1292 wrote to memory of 1356 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 33 PID 1292 wrote to memory of 1356 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 33 PID 1292 wrote to memory of 1356 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 33 PID 676 wrote to memory of 1852 676 data.exe 34 PID 676 wrote to memory of 1852 676 data.exe 34 PID 676 wrote to memory of 1852 676 data.exe 34 PID 676 wrote to memory of 1852 676 data.exe 34 PID 1292 wrote to memory of 824 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 35 PID 1292 wrote to memory of 824 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 35 PID 1292 wrote to memory of 824 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 35 PID 1292 wrote to memory of 824 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 35 PID 1292 wrote to memory of 1244 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 37 PID 1292 wrote to memory of 1244 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 37 PID 1292 wrote to memory of 1244 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 37 PID 1292 wrote to memory of 1244 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 37 PID 992 wrote to memory of 1592 992 backup.exe 36 PID 992 wrote to memory of 1592 992 backup.exe 36 PID 992 wrote to memory of 1592 992 backup.exe 36 PID 992 wrote to memory of 1592 992 backup.exe 36 PID 1592 wrote to memory of 776 1592 backup.exe 38 PID 1592 wrote to memory of 776 1592 backup.exe 38 PID 1592 wrote to memory of 776 1592 backup.exe 38 PID 1592 wrote to memory of 776 1592 backup.exe 38 PID 1292 wrote to memory of 1968 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 39 PID 1292 wrote to memory of 1968 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 39 PID 1292 wrote to memory of 1968 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 39 PID 1292 wrote to memory of 1968 1292 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe 39 PID 776 wrote to memory of 960 776 data.exe 40 PID 776 wrote to memory of 960 776 data.exe 40 PID 776 wrote to memory of 960 776 data.exe 40 PID 776 wrote to memory of 960 776 data.exe 40 PID 1592 wrote to memory of 484 1592 backup.exe 41 PID 1592 wrote to memory of 484 1592 backup.exe 41 PID 1592 wrote to memory of 484 1592 backup.exe 41 PID 1592 wrote to memory of 484 1592 backup.exe 41 PID 484 wrote to memory of 1624 484 backup.exe 42 PID 484 wrote to memory of 1624 484 backup.exe 42 PID 484 wrote to memory of 1624 484 backup.exe 42 PID 484 wrote to memory of 1624 484 backup.exe 42 PID 1624 wrote to memory of 952 1624 backup.exe 43 PID 1624 wrote to memory of 952 1624 backup.exe 43 PID 1624 wrote to memory of 952 1624 backup.exe 43 PID 1624 wrote to memory of 952 1624 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe"C:\Users\Admin\AppData\Local\Temp\6a95185445bb5851d73738ce1c826da69171486e1f1ebe5de1684ba3cfc85c91.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\1366749034\backup.exeC:\Users\Admin\AppData\Local\Temp\1366749034\backup.exe C:\Users\Admin\AppData\Local\Temp\1366749034\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:832 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:992 -
C:\PerfLogs\data.exeC:\PerfLogs\data.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:676 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\7-Zip\data.exe"C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:776 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:484 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1624 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- System policy modification
PID:1476 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1776
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
PID:364
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
PID:1960
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Suspicious use of SetWindowsHookEx
PID:924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1444
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1280
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1680
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1308
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1980
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:924
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1272
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Executes dropped EXE
PID:584
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Executes dropped EXE
PID:1824
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:1048
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Executes dropped EXE
PID:1452
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1752
-
-
-
-
C:\Program Files\DVD Maker\System Restore.exe"C:\Program Files\DVD Maker\System Restore.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1416
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:432
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1164
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:968
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1172 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1348 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:952 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:1424
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Executes dropped EXE
PID:296
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
PID:1768
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Executes dropped EXE
PID:652
-
-
C:\Program Files (x86)\Microsoft Analysis Services\data.exe"C:\Program Files (x86)\Microsoft Analysis Services\data.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1148
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
PID:1128
-
-
C:\Users\Public\update.exeC:\Users\Public\update.exe C:\Users\Public\5⤵PID:1336
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a845f5a12195223c356d8599218c2f5d
SHA1e52cf5c5362b0bf298b1a2c93e7202006b88eff5
SHA2560dd34aa3c2f3bba548c9d39ec47753d5783b0a59394e06595161c46e290b8e1c
SHA51239e82f712cd59a1bfa655887e6cbf3f59c13e5dd006a39934780a85fecbca02d5856bf855ac1a661a746b64a340028e741bdcba52d77685a38ca955579e8ebc7
-
Filesize
72KB
MD5e0aec7298a40c8483dc454fafd80c4f4
SHA16a03a5fb5d7b4c5cec81e505aeb7f0c5f33c6c2c
SHA25657a3082694137ad7d0b2739e2f017ec6c7f168f3bec7ebb88ebe82fb84ed0b98
SHA5127f1c26367b4a1f4ee0326bfee4cef66e48d973f81c92d815340bb9926dbc721798b8136495f1138191f68ff2a2a0f87a7561317893e9b79132821febadb26583
-
Filesize
72KB
MD5e0aec7298a40c8483dc454fafd80c4f4
SHA16a03a5fb5d7b4c5cec81e505aeb7f0c5f33c6c2c
SHA25657a3082694137ad7d0b2739e2f017ec6c7f168f3bec7ebb88ebe82fb84ed0b98
SHA5127f1c26367b4a1f4ee0326bfee4cef66e48d973f81c92d815340bb9926dbc721798b8136495f1138191f68ff2a2a0f87a7561317893e9b79132821febadb26583
-
Filesize
72KB
MD5bd0e164e74eb085c8052e0140721e1e0
SHA1fd9bda867320b198bbdd446027dec15fac217a4d
SHA256c6818ee6fb7a1eb67ced44c4f8265ff2da7d7508cf8a01bad206cc4a1155f8fd
SHA512bc447093961844b9bd5cede720ca780d2d4094dc03f388c2453849427292161876c1fb7b90855a783cf7ef0ff9186cac6810e76572538fbb8e3672d4e02ff852
-
Filesize
72KB
MD50991ad46e3013620c0206175cb8b743a
SHA19d84534d7f29ec41d7f90c5b408c2400ffe6cd7b
SHA256c251b3a1c465fd71003b991724334702754506d74f8284bf2afd788030d6b30e
SHA512b27d5abe0cd7fe0cead2b99cbce25fbbf8967d90b03e3853f34140c8011acf4c7e2bd6334d0408bb6507c19821ed9365228c5922afcf579467ef0cb8ee80c2e2
-
Filesize
72KB
MD50991ad46e3013620c0206175cb8b743a
SHA19d84534d7f29ec41d7f90c5b408c2400ffe6cd7b
SHA256c251b3a1c465fd71003b991724334702754506d74f8284bf2afd788030d6b30e
SHA512b27d5abe0cd7fe0cead2b99cbce25fbbf8967d90b03e3853f34140c8011acf4c7e2bd6334d0408bb6507c19821ed9365228c5922afcf579467ef0cb8ee80c2e2
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD559c700256dddcbc14bc2b82933d73b83
SHA1c92edf66ba6f5db84dd0a70538f7ba7ded162046
SHA2564ef0538d13fcf56bf8c33470495b9300a59286020f86b4ef00f53dd747afb53f
SHA512ec016792cf405f17b9d398306e8c4358c899937751286893d770148832e8ce36341bac6b77dba32bc518278abe9669bd62480ff39e080d9be27945e65599271b
-
Filesize
72KB
MD5ed61e8bc8e5d785f3fd9205b8d73d636
SHA1077d58b16854e6a6a60555b29d1cac64fed42398
SHA256d050eba74ab68467acf94494feefe87e4e164ece1c00de9f354d20c62441b219
SHA512ca3cb65267ff8aa2580b4baf5db8ed44a75741258c3ff5af1096e35deffeba84da425a03699452fc8fe71addb7cbb1eafeea7f0687311b7796f6fecce9c991c7
-
Filesize
72KB
MD5ed61e8bc8e5d785f3fd9205b8d73d636
SHA1077d58b16854e6a6a60555b29d1cac64fed42398
SHA256d050eba74ab68467acf94494feefe87e4e164ece1c00de9f354d20c62441b219
SHA512ca3cb65267ff8aa2580b4baf5db8ed44a75741258c3ff5af1096e35deffeba84da425a03699452fc8fe71addb7cbb1eafeea7f0687311b7796f6fecce9c991c7
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD56ae6784a84c950a97f6ab10abe3b9d08
SHA14a667fefce6f0f57ba4f0833b3bef3208ad2f68d
SHA256d35a6642840ef5595f7961e75dfbe4b9df70df719052006ec60c041ae62cd79b
SHA512f6fdc96435b810b8dfa0f8312de368e544cd63f4d624514b3667ca25065e9050cd2fbc2a58ec17839c6e9bbc3af793f47ecb021f9fabb0731c1f98203c1481de
-
Filesize
72KB
MD56ae6784a84c950a97f6ab10abe3b9d08
SHA14a667fefce6f0f57ba4f0833b3bef3208ad2f68d
SHA256d35a6642840ef5595f7961e75dfbe4b9df70df719052006ec60c041ae62cd79b
SHA512f6fdc96435b810b8dfa0f8312de368e544cd63f4d624514b3667ca25065e9050cd2fbc2a58ec17839c6e9bbc3af793f47ecb021f9fabb0731c1f98203c1481de
-
Filesize
72KB
MD5b7c04d7640ed7917aa3dd04b02b33219
SHA11702fbb0276c4d12d04c1d9cd55c444c8faa2e3f
SHA256f4b78f68ab9348f4516c1b1b82d4dac059622d65532e0732334783ddcd145b26
SHA5126175c67190a3797abc12c966b2d4563830235f0e845d6f8f409763fcfc54f4e012212f3e37fe0f4d4c0a60e01b0d52d1710328acb5258ffe78b33f3dd36b6a6c
-
Filesize
72KB
MD5c69181fd486d9c3527789ab3928aceb0
SHA12e0b7298dc7724ae406721add88e8f9a5beb8452
SHA2565c1910e9779984bff055b276af4fc55ba5c8b15c9d3476909de487026f253a44
SHA51277cb8ce151611e141a046f5e4eca66b7b8b7a2322cb4b1ffdf06391f0c96249554c93279d4de71d8e3225942669a9412df485e3fa263d60c80a6bcf2a45fe4d1
-
Filesize
72KB
MD5c69181fd486d9c3527789ab3928aceb0
SHA12e0b7298dc7724ae406721add88e8f9a5beb8452
SHA2565c1910e9779984bff055b276af4fc55ba5c8b15c9d3476909de487026f253a44
SHA51277cb8ce151611e141a046f5e4eca66b7b8b7a2322cb4b1ffdf06391f0c96249554c93279d4de71d8e3225942669a9412df485e3fa263d60c80a6bcf2a45fe4d1
-
Filesize
72KB
MD581ee390647b0600d7db58400702b1b4f
SHA1080eed36b0589204a62092a93cc1856211b2402a
SHA256809c225998a1f4cabfc9d0868a890c9998941bcc5a9cbd0f3de2502b49b184cd
SHA5127b6c78a9222e2005c9826ed03afdded83ad5849fb1a6c3c8d0fbb377a8b8fa9d69f9b6a69429148d43150307cb2a0dfc14e4a46b121030a5c439dbb93a2580b8
-
Filesize
72KB
MD581ee390647b0600d7db58400702b1b4f
SHA1080eed36b0589204a62092a93cc1856211b2402a
SHA256809c225998a1f4cabfc9d0868a890c9998941bcc5a9cbd0f3de2502b49b184cd
SHA5127b6c78a9222e2005c9826ed03afdded83ad5849fb1a6c3c8d0fbb377a8b8fa9d69f9b6a69429148d43150307cb2a0dfc14e4a46b121030a5c439dbb93a2580b8
-
Filesize
72KB
MD57f1501885ef32b2f1372eba266d6169d
SHA1bb52bf4ab8a77f26424a44dbcda00f5ea41e1007
SHA25604c1f282f951332b07cab067507edf36ea7c2aab625ffaf9075f6a37eae88de1
SHA51205a4c33353f29060544a859148dfdaf7b998ce19ba6d1d64a23260c489019f99d7c59552c4d42799f1ca3f1d9a571306f10406d1cb105a2a7e2557749b798bcd
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c2de125c8fb3da2555cf5d1cff3ad7ac
SHA1ad872f0d5d162cb3c9b1a4bd66dbd9dc4e63838a
SHA256d804f55fefb0989a70f017e3c5818d9a31bc314a6d1a6d06a03f5ec87d0c99cd
SHA5123c061593671a49dd596cfdb1f2476cf3682190c4e2ddcfa28bdfb7d730e23a911475a922022faa065b58dd67a89ae379414b2c8d338f2c87c47842beb174515e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD51c08f617856467a84f45b82dc234d989
SHA1b66ec0ee501c507de12d116da303ddb2236352c4
SHA256a78b28e6c0038038b633410964967adaf53a5c136dcb779205eeb2f1ef2fded3
SHA512c2b078a6eb9e194904a6f21a681390c6580c1445ec11e027cfa68042bed641372edcb7539262a900a2b09c1cb8b44c299941da5aad87e339638eb81cd7a1e35f
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD5726947791d12d38612f062c646a9e7b7
SHA16aaadc28252ff05743b127dc4452467059e22e9b
SHA256cb92cefe48d93afa3bc613abffd7d6fab89842e5a7e0d08a33cddbd578cf03ca
SHA51201fac239d1dc404d46bced946929d2cc02a0be1e682406af9adcd746b54303cae48a9d8f4f4122f2aa955cb1b5c9e21ade6c80552662eea4e625bb15bd21a202
-
Filesize
72KB
MD5726947791d12d38612f062c646a9e7b7
SHA16aaadc28252ff05743b127dc4452467059e22e9b
SHA256cb92cefe48d93afa3bc613abffd7d6fab89842e5a7e0d08a33cddbd578cf03ca
SHA51201fac239d1dc404d46bced946929d2cc02a0be1e682406af9adcd746b54303cae48a9d8f4f4122f2aa955cb1b5c9e21ade6c80552662eea4e625bb15bd21a202
-
Filesize
72KB
MD5a845f5a12195223c356d8599218c2f5d
SHA1e52cf5c5362b0bf298b1a2c93e7202006b88eff5
SHA2560dd34aa3c2f3bba548c9d39ec47753d5783b0a59394e06595161c46e290b8e1c
SHA51239e82f712cd59a1bfa655887e6cbf3f59c13e5dd006a39934780a85fecbca02d5856bf855ac1a661a746b64a340028e741bdcba52d77685a38ca955579e8ebc7
-
Filesize
72KB
MD5a845f5a12195223c356d8599218c2f5d
SHA1e52cf5c5362b0bf298b1a2c93e7202006b88eff5
SHA2560dd34aa3c2f3bba548c9d39ec47753d5783b0a59394e06595161c46e290b8e1c
SHA51239e82f712cd59a1bfa655887e6cbf3f59c13e5dd006a39934780a85fecbca02d5856bf855ac1a661a746b64a340028e741bdcba52d77685a38ca955579e8ebc7
-
Filesize
72KB
MD5e0aec7298a40c8483dc454fafd80c4f4
SHA16a03a5fb5d7b4c5cec81e505aeb7f0c5f33c6c2c
SHA25657a3082694137ad7d0b2739e2f017ec6c7f168f3bec7ebb88ebe82fb84ed0b98
SHA5127f1c26367b4a1f4ee0326bfee4cef66e48d973f81c92d815340bb9926dbc721798b8136495f1138191f68ff2a2a0f87a7561317893e9b79132821febadb26583
-
Filesize
72KB
MD5e0aec7298a40c8483dc454fafd80c4f4
SHA16a03a5fb5d7b4c5cec81e505aeb7f0c5f33c6c2c
SHA25657a3082694137ad7d0b2739e2f017ec6c7f168f3bec7ebb88ebe82fb84ed0b98
SHA5127f1c26367b4a1f4ee0326bfee4cef66e48d973f81c92d815340bb9926dbc721798b8136495f1138191f68ff2a2a0f87a7561317893e9b79132821febadb26583
-
Filesize
72KB
MD57e8e0d689df8ae4a6f335b47a3a1f21f
SHA110390d466f7e09e5f6c76f81f2445b5026e209d7
SHA2565039e1d6a2be1d2e5e38c25c0d509b6d001943691d1c61bc7789f7373be23240
SHA51279b871bee433e9ee81ba8678e0be8602a1734188dcc361cdedb4d522c94644727c28bd4714c1259be15ab74129af9a98eceb18fcd284ab5eec880e46de1e8fd9
-
Filesize
72KB
MD57e8e0d689df8ae4a6f335b47a3a1f21f
SHA110390d466f7e09e5f6c76f81f2445b5026e209d7
SHA2565039e1d6a2be1d2e5e38c25c0d509b6d001943691d1c61bc7789f7373be23240
SHA51279b871bee433e9ee81ba8678e0be8602a1734188dcc361cdedb4d522c94644727c28bd4714c1259be15ab74129af9a98eceb18fcd284ab5eec880e46de1e8fd9
-
Filesize
72KB
MD5bd0e164e74eb085c8052e0140721e1e0
SHA1fd9bda867320b198bbdd446027dec15fac217a4d
SHA256c6818ee6fb7a1eb67ced44c4f8265ff2da7d7508cf8a01bad206cc4a1155f8fd
SHA512bc447093961844b9bd5cede720ca780d2d4094dc03f388c2453849427292161876c1fb7b90855a783cf7ef0ff9186cac6810e76572538fbb8e3672d4e02ff852
-
Filesize
72KB
MD5bd0e164e74eb085c8052e0140721e1e0
SHA1fd9bda867320b198bbdd446027dec15fac217a4d
SHA256c6818ee6fb7a1eb67ced44c4f8265ff2da7d7508cf8a01bad206cc4a1155f8fd
SHA512bc447093961844b9bd5cede720ca780d2d4094dc03f388c2453849427292161876c1fb7b90855a783cf7ef0ff9186cac6810e76572538fbb8e3672d4e02ff852
-
Filesize
72KB
MD50991ad46e3013620c0206175cb8b743a
SHA19d84534d7f29ec41d7f90c5b408c2400ffe6cd7b
SHA256c251b3a1c465fd71003b991724334702754506d74f8284bf2afd788030d6b30e
SHA512b27d5abe0cd7fe0cead2b99cbce25fbbf8967d90b03e3853f34140c8011acf4c7e2bd6334d0408bb6507c19821ed9365228c5922afcf579467ef0cb8ee80c2e2
-
Filesize
72KB
MD50991ad46e3013620c0206175cb8b743a
SHA19d84534d7f29ec41d7f90c5b408c2400ffe6cd7b
SHA256c251b3a1c465fd71003b991724334702754506d74f8284bf2afd788030d6b30e
SHA512b27d5abe0cd7fe0cead2b99cbce25fbbf8967d90b03e3853f34140c8011acf4c7e2bd6334d0408bb6507c19821ed9365228c5922afcf579467ef0cb8ee80c2e2
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD559c700256dddcbc14bc2b82933d73b83
SHA1c92edf66ba6f5db84dd0a70538f7ba7ded162046
SHA2564ef0538d13fcf56bf8c33470495b9300a59286020f86b4ef00f53dd747afb53f
SHA512ec016792cf405f17b9d398306e8c4358c899937751286893d770148832e8ce36341bac6b77dba32bc518278abe9669bd62480ff39e080d9be27945e65599271b
-
Filesize
72KB
MD559c700256dddcbc14bc2b82933d73b83
SHA1c92edf66ba6f5db84dd0a70538f7ba7ded162046
SHA2564ef0538d13fcf56bf8c33470495b9300a59286020f86b4ef00f53dd747afb53f
SHA512ec016792cf405f17b9d398306e8c4358c899937751286893d770148832e8ce36341bac6b77dba32bc518278abe9669bd62480ff39e080d9be27945e65599271b
-
Filesize
72KB
MD5ed61e8bc8e5d785f3fd9205b8d73d636
SHA1077d58b16854e6a6a60555b29d1cac64fed42398
SHA256d050eba74ab68467acf94494feefe87e4e164ece1c00de9f354d20c62441b219
SHA512ca3cb65267ff8aa2580b4baf5db8ed44a75741258c3ff5af1096e35deffeba84da425a03699452fc8fe71addb7cbb1eafeea7f0687311b7796f6fecce9c991c7
-
Filesize
72KB
MD5ed61e8bc8e5d785f3fd9205b8d73d636
SHA1077d58b16854e6a6a60555b29d1cac64fed42398
SHA256d050eba74ab68467acf94494feefe87e4e164ece1c00de9f354d20c62441b219
SHA512ca3cb65267ff8aa2580b4baf5db8ed44a75741258c3ff5af1096e35deffeba84da425a03699452fc8fe71addb7cbb1eafeea7f0687311b7796f6fecce9c991c7
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD5ebb9dd5aff2e3a9adec97632da09748c
SHA1d6c912cb55c1461aaed9e607e69a8369292c5ddd
SHA2561b0246463ca369b5be3f36be33228147378f505ff856f7573840cd2dd8ad93e0
SHA5125d0a00d45de2a196b27ec3b651529d85d775788119296417275b75b962e3f49071ddae61d1225b3471bf0bc58b526b8fc844ed882ad758f1b40677076f322455
-
Filesize
72KB
MD56ae6784a84c950a97f6ab10abe3b9d08
SHA14a667fefce6f0f57ba4f0833b3bef3208ad2f68d
SHA256d35a6642840ef5595f7961e75dfbe4b9df70df719052006ec60c041ae62cd79b
SHA512f6fdc96435b810b8dfa0f8312de368e544cd63f4d624514b3667ca25065e9050cd2fbc2a58ec17839c6e9bbc3af793f47ecb021f9fabb0731c1f98203c1481de
-
Filesize
72KB
MD56ae6784a84c950a97f6ab10abe3b9d08
SHA14a667fefce6f0f57ba4f0833b3bef3208ad2f68d
SHA256d35a6642840ef5595f7961e75dfbe4b9df70df719052006ec60c041ae62cd79b
SHA512f6fdc96435b810b8dfa0f8312de368e544cd63f4d624514b3667ca25065e9050cd2fbc2a58ec17839c6e9bbc3af793f47ecb021f9fabb0731c1f98203c1481de
-
Filesize
72KB
MD5b7c04d7640ed7917aa3dd04b02b33219
SHA11702fbb0276c4d12d04c1d9cd55c444c8faa2e3f
SHA256f4b78f68ab9348f4516c1b1b82d4dac059622d65532e0732334783ddcd145b26
SHA5126175c67190a3797abc12c966b2d4563830235f0e845d6f8f409763fcfc54f4e012212f3e37fe0f4d4c0a60e01b0d52d1710328acb5258ffe78b33f3dd36b6a6c
-
Filesize
72KB
MD5b7c04d7640ed7917aa3dd04b02b33219
SHA11702fbb0276c4d12d04c1d9cd55c444c8faa2e3f
SHA256f4b78f68ab9348f4516c1b1b82d4dac059622d65532e0732334783ddcd145b26
SHA5126175c67190a3797abc12c966b2d4563830235f0e845d6f8f409763fcfc54f4e012212f3e37fe0f4d4c0a60e01b0d52d1710328acb5258ffe78b33f3dd36b6a6c
-
Filesize
72KB
MD5c69181fd486d9c3527789ab3928aceb0
SHA12e0b7298dc7724ae406721add88e8f9a5beb8452
SHA2565c1910e9779984bff055b276af4fc55ba5c8b15c9d3476909de487026f253a44
SHA51277cb8ce151611e141a046f5e4eca66b7b8b7a2322cb4b1ffdf06391f0c96249554c93279d4de71d8e3225942669a9412df485e3fa263d60c80a6bcf2a45fe4d1
-
Filesize
72KB
MD5c69181fd486d9c3527789ab3928aceb0
SHA12e0b7298dc7724ae406721add88e8f9a5beb8452
SHA2565c1910e9779984bff055b276af4fc55ba5c8b15c9d3476909de487026f253a44
SHA51277cb8ce151611e141a046f5e4eca66b7b8b7a2322cb4b1ffdf06391f0c96249554c93279d4de71d8e3225942669a9412df485e3fa263d60c80a6bcf2a45fe4d1
-
Filesize
72KB
MD581ee390647b0600d7db58400702b1b4f
SHA1080eed36b0589204a62092a93cc1856211b2402a
SHA256809c225998a1f4cabfc9d0868a890c9998941bcc5a9cbd0f3de2502b49b184cd
SHA5127b6c78a9222e2005c9826ed03afdded83ad5849fb1a6c3c8d0fbb377a8b8fa9d69f9b6a69429148d43150307cb2a0dfc14e4a46b121030a5c439dbb93a2580b8
-
Filesize
72KB
MD581ee390647b0600d7db58400702b1b4f
SHA1080eed36b0589204a62092a93cc1856211b2402a
SHA256809c225998a1f4cabfc9d0868a890c9998941bcc5a9cbd0f3de2502b49b184cd
SHA5127b6c78a9222e2005c9826ed03afdded83ad5849fb1a6c3c8d0fbb377a8b8fa9d69f9b6a69429148d43150307cb2a0dfc14e4a46b121030a5c439dbb93a2580b8
-
Filesize
72KB
MD57f1501885ef32b2f1372eba266d6169d
SHA1bb52bf4ab8a77f26424a44dbcda00f5ea41e1007
SHA25604c1f282f951332b07cab067507edf36ea7c2aab625ffaf9075f6a37eae88de1
SHA51205a4c33353f29060544a859148dfdaf7b998ce19ba6d1d64a23260c489019f99d7c59552c4d42799f1ca3f1d9a571306f10406d1cb105a2a7e2557749b798bcd
-
Filesize
72KB
MD57f1501885ef32b2f1372eba266d6169d
SHA1bb52bf4ab8a77f26424a44dbcda00f5ea41e1007
SHA25604c1f282f951332b07cab067507edf36ea7c2aab625ffaf9075f6a37eae88de1
SHA51205a4c33353f29060544a859148dfdaf7b998ce19ba6d1d64a23260c489019f99d7c59552c4d42799f1ca3f1d9a571306f10406d1cb105a2a7e2557749b798bcd
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c2de125c8fb3da2555cf5d1cff3ad7ac
SHA1ad872f0d5d162cb3c9b1a4bd66dbd9dc4e63838a
SHA256d804f55fefb0989a70f017e3c5818d9a31bc314a6d1a6d06a03f5ec87d0c99cd
SHA5123c061593671a49dd596cfdb1f2476cf3682190c4e2ddcfa28bdfb7d730e23a911475a922022faa065b58dd67a89ae379414b2c8d338f2c87c47842beb174515e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c2de125c8fb3da2555cf5d1cff3ad7ac
SHA1ad872f0d5d162cb3c9b1a4bd66dbd9dc4e63838a
SHA256d804f55fefb0989a70f017e3c5818d9a31bc314a6d1a6d06a03f5ec87d0c99cd
SHA5123c061593671a49dd596cfdb1f2476cf3682190c4e2ddcfa28bdfb7d730e23a911475a922022faa065b58dd67a89ae379414b2c8d338f2c87c47842beb174515e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD51c08f617856467a84f45b82dc234d989
SHA1b66ec0ee501c507de12d116da303ddb2236352c4
SHA256a78b28e6c0038038b633410964967adaf53a5c136dcb779205eeb2f1ef2fded3
SHA512c2b078a6eb9e194904a6f21a681390c6580c1445ec11e027cfa68042bed641372edcb7539262a900a2b09c1cb8b44c299941da5aad87e339638eb81cd7a1e35f
-
Filesize
72KB
MD51c08f617856467a84f45b82dc234d989
SHA1b66ec0ee501c507de12d116da303ddb2236352c4
SHA256a78b28e6c0038038b633410964967adaf53a5c136dcb779205eeb2f1ef2fded3
SHA512c2b078a6eb9e194904a6f21a681390c6580c1445ec11e027cfa68042bed641372edcb7539262a900a2b09c1cb8b44c299941da5aad87e339638eb81cd7a1e35f
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040
-
Filesize
72KB
MD57614422a0aef21d25718b28e7c9377df
SHA185a1bfc972ebd7ec42cc114360249d8814b94fe7
SHA2567690c8163d810b210aa2908e61a70e7d66922c72298451aabc2faa6ca8eaa2c3
SHA512b93f123513721c4fc8df991a4cd57f767be1283f75db28c7851f8ebd1adf92d5e2004b296b3e886dc63d82a93afdf5ef2524f08cd4f40d578fa9b693784c9040