Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
190s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe
Resource
win10v2004-20220812-en
General
-
Target
6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe
-
Size
72KB
-
MD5
04314172d2a18ed39928be0cd4406097
-
SHA1
f589debf8be3e07ba313e1a5ddfaa81573950dc3
-
SHA256
6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f
-
SHA512
c5c2adbd2190a83552a7af778352af3541c01b7c79c83bc590a1968f3ec449fa1b8f217be190d71eb09a5831536e12c833c4974acc309d636980b174b1c6ee1c
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2P:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 51 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1480 backup.exe 1492 backup.exe 1764 backup.exe 872 backup.exe 920 backup.exe 1748 backup.exe 912 System Restore.exe 432 backup.exe 840 backup.exe 852 backup.exe 1704 backup.exe 1980 backup.exe 1868 backup.exe 1004 backup.exe 1804 backup.exe 1308 backup.exe 1608 backup.exe 592 backup.exe 1400 backup.exe 640 backup.exe 1720 System Restore.exe 900 backup.exe 1588 backup.exe 1584 backup.exe 1748 backup.exe 1560 backup.exe 1864 System Restore.exe 1592 backup.exe 1924 backup.exe 2032 backup.exe 932 data.exe 556 backup.exe 1520 update.exe 2028 backup.exe 1636 backup.exe 1752 backup.exe 1416 backup.exe 108 backup.exe 1604 backup.exe 1772 backup.exe 1404 backup.exe 1204 backup.exe 1116 backup.exe 592 backup.exe 608 backup.exe 1532 backup.exe 1360 backup.exe 1128 backup.exe 1032 backup.exe 920 backup.exe 1748 backup.exe 1808 backup.exe 912 System Restore.exe 1560 backup.exe 692 backup.exe 1384 backup.exe 580 backup.exe 968 backup.exe 564 backup.exe 1772 backup.exe 1824 backup.exe 1548 backup.exe 900 backup.exe 1588 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 432 backup.exe 432 backup.exe 840 backup.exe 840 backup.exe 432 backup.exe 432 backup.exe 1704 backup.exe 1704 backup.exe 1980 backup.exe 1980 backup.exe 1704 backup.exe 1704 backup.exe 1004 backup.exe 1004 backup.exe 1804 backup.exe 1804 backup.exe 1804 backup.exe 1804 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 432 backup.exe 432 backup.exe 1608 backup.exe 1004 backup.exe 1608 backup.exe 1004 backup.exe 1804 backup.exe 1804 backup.exe 1704 backup.exe 1004 backup.exe 1004 backup.exe 1608 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe data.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 1480 backup.exe 1492 backup.exe 1764 backup.exe 872 backup.exe 920 backup.exe 1748 backup.exe 912 System Restore.exe 432 backup.exe 840 backup.exe 852 backup.exe 1704 backup.exe 1980 backup.exe 1868 backup.exe 1004 backup.exe 1804 backup.exe 1308 backup.exe 1608 backup.exe 592 backup.exe 1400 backup.exe 640 backup.exe 1720 System Restore.exe 900 backup.exe 1588 backup.exe 1584 backup.exe 1748 backup.exe 1560 backup.exe 1864 System Restore.exe 1592 backup.exe 1924 backup.exe 932 data.exe 2032 backup.exe 556 backup.exe 1636 backup.exe 2028 backup.exe 1752 backup.exe 1416 backup.exe 1404 backup.exe 108 backup.exe 1772 backup.exe 1604 backup.exe 1116 backup.exe 608 backup.exe 592 backup.exe 1032 backup.exe 1532 backup.exe 1360 backup.exe 1520 update.exe 1128 backup.exe 920 backup.exe 1748 backup.exe 1808 backup.exe 1560 backup.exe 692 backup.exe 912 System Restore.exe 1384 backup.exe 580 backup.exe 968 backup.exe 564 backup.exe 1772 backup.exe 1588 backup.exe 1548 backup.exe 900 backup.exe 1204 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 896 wrote to memory of 1480 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 28 PID 896 wrote to memory of 1480 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 28 PID 896 wrote to memory of 1480 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 28 PID 896 wrote to memory of 1480 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 28 PID 896 wrote to memory of 1492 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 29 PID 896 wrote to memory of 1492 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 29 PID 896 wrote to memory of 1492 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 29 PID 896 wrote to memory of 1492 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 29 PID 896 wrote to memory of 1764 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 30 PID 896 wrote to memory of 1764 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 30 PID 896 wrote to memory of 1764 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 30 PID 896 wrote to memory of 1764 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 30 PID 896 wrote to memory of 872 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 31 PID 896 wrote to memory of 872 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 31 PID 896 wrote to memory of 872 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 31 PID 896 wrote to memory of 872 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 31 PID 896 wrote to memory of 920 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 32 PID 896 wrote to memory of 920 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 32 PID 896 wrote to memory of 920 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 32 PID 896 wrote to memory of 920 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 32 PID 896 wrote to memory of 1748 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 33 PID 896 wrote to memory of 1748 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 33 PID 896 wrote to memory of 1748 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 33 PID 896 wrote to memory of 1748 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 33 PID 896 wrote to memory of 912 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 34 PID 896 wrote to memory of 912 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 34 PID 896 wrote to memory of 912 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 34 PID 896 wrote to memory of 912 896 6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe 34 PID 1480 wrote to memory of 432 1480 backup.exe 35 PID 1480 wrote to memory of 432 1480 backup.exe 35 PID 1480 wrote to memory of 432 1480 backup.exe 35 PID 1480 wrote to memory of 432 1480 backup.exe 35 PID 432 wrote to memory of 840 432 backup.exe 36 PID 432 wrote to memory of 840 432 backup.exe 36 PID 432 wrote to memory of 840 432 backup.exe 36 PID 432 wrote to memory of 840 432 backup.exe 36 PID 840 wrote to memory of 852 840 backup.exe 37 PID 840 wrote to memory of 852 840 backup.exe 37 PID 840 wrote to memory of 852 840 backup.exe 37 PID 840 wrote to memory of 852 840 backup.exe 37 PID 432 wrote to memory of 1704 432 backup.exe 38 PID 432 wrote to memory of 1704 432 backup.exe 38 PID 432 wrote to memory of 1704 432 backup.exe 38 PID 432 wrote to memory of 1704 432 backup.exe 38 PID 1704 wrote to memory of 1980 1704 backup.exe 39 PID 1704 wrote to memory of 1980 1704 backup.exe 39 PID 1704 wrote to memory of 1980 1704 backup.exe 39 PID 1704 wrote to memory of 1980 1704 backup.exe 39 PID 1980 wrote to memory of 1868 1980 backup.exe 40 PID 1980 wrote to memory of 1868 1980 backup.exe 40 PID 1980 wrote to memory of 1868 1980 backup.exe 40 PID 1980 wrote to memory of 1868 1980 backup.exe 40 PID 1704 wrote to memory of 1004 1704 backup.exe 41 PID 1704 wrote to memory of 1004 1704 backup.exe 41 PID 1704 wrote to memory of 1004 1704 backup.exe 41 PID 1704 wrote to memory of 1004 1704 backup.exe 41 PID 1004 wrote to memory of 1804 1004 backup.exe 42 PID 1004 wrote to memory of 1804 1004 backup.exe 42 PID 1004 wrote to memory of 1804 1004 backup.exe 42 PID 1004 wrote to memory of 1804 1004 backup.exe 42 PID 1804 wrote to memory of 1308 1804 backup.exe 43 PID 1804 wrote to memory of 1308 1804 backup.exe 43 PID 1804 wrote to memory of 1308 1804 backup.exe 43 PID 1804 wrote to memory of 1308 1804 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe"C:\Users\Admin\AppData\Local\Temp\6109e9e33f85b4ade1240e61eeab199ab9f8b2b6e6e68742850e34b1f67a297f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Users\Admin\AppData\Local\Temp\2955683572\backup.exeC:\Users\Admin\AppData\Local\Temp\2955683572\backup.exe C:\Users\Admin\AppData\Local\Temp\2955683572\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1480 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:432 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:840 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1704 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1980 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1868
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1004 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1804 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1308
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1400
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:900
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1864
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:1008
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1456
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1204
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:692
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:1076
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1744
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:608
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\data.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\data.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:952
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:700
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:828
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:1288
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2032
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1116
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:592
-
-
-
C:\Program Files\DVD Maker\update.exe"C:\Program Files\DVD Maker\update.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1360 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:976
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1080
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1116
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1016
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:1960
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:432
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:540
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:308
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:108
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:2000
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:268
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1956
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1436
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1416 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1776
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1752
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1616
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:580 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:1980
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\WPDNSE\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:912
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD563e286d623eb8e6f4c66afbafb7d5f7b
SHA1cbc92d0ea5bb18a9faf07822bb321c141168d9e1
SHA2569747c25517ed171395a72e4d5cbb76ad02ca67ee2a9283c924b0323ea7357417
SHA5123b0cb6b222fb6290779d1bb01b26eebcf5deab5e807f6181cc753a7c60fbf87e6a9aec7265fd627d73e59b88d87c67a10fd1143fc5a8bf346df77a9ddc5ac8a4
-
Filesize
72KB
MD563e286d623eb8e6f4c66afbafb7d5f7b
SHA1cbc92d0ea5bb18a9faf07822bb321c141168d9e1
SHA2569747c25517ed171395a72e4d5cbb76ad02ca67ee2a9283c924b0323ea7357417
SHA5123b0cb6b222fb6290779d1bb01b26eebcf5deab5e807f6181cc753a7c60fbf87e6a9aec7265fd627d73e59b88d87c67a10fd1143fc5a8bf346df77a9ddc5ac8a4
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD5ecb06e1913b0a508ca2f86cbd684cb1d
SHA1564cced09651bd8831b7dc37e12ce4358c147c83
SHA256e8820157b0fe3d65c90296ab3cdb68d0744b578b1d86c63b1bc32e978f97e07d
SHA512dbc74ae92ed46765d6da562692892b367adf12b25147608b7ff45b52dc6908e86839e7a954e00c75537b26c8119d6adc36efcc60ccda38747f530652528f742e
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD58437886ed408b989815a4a6f157764b7
SHA19bfeb76ae342c159a7fca85f1c135bfc95f3a61b
SHA256476732df18978aa5acbe05577a0c9556709558392493adefb4c2994a5a72969e
SHA512ee04431640e2ccf17ae7a5d5a80479109202b60362fc543f2aba8e9ba329c0123b88c02b91f862abd976258e5853851758176094d4151e4431a47f1eb21cb046
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD58089e0a333d014af46467610e5e44073
SHA1f7eb76b85aecb34006caab94b91904631b4103e1
SHA25644d8ac1461e3af6cf1922d6170cbeb3a7015776725871d90e3415927c6bb0caf
SHA5120b39c4cd80090ff8e92ad36130742be9a16dbf4632aeffed20aca976621344682c6586ac2ee0fb29b3273869b6d27c6f118941c5b697d00e8ccab871cb310659
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD550605ee6a0fe212360ff07e1d507d3c4
SHA1c051938788c77a890fd855c7423067c6289ace3a
SHA2564ab6395f63f8e079103645c0f0bbb4ce45c34ffb41066dc6f77afffb47ec097e
SHA512ee48eeadae5a66e7210ad920488134127a0d321504c89d354b366c4f85d7b8dc7b9f74b0442c2eac9357894be404163a4b7546b71b81dcce18203f27077d9132
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50f1749734c1d71e4b0c7077dd55b6907
SHA117b0754d9e477ffbae1ccab994d1182bc6fd2d2c
SHA256a08e56aaaa455f4ad46ef5ce5d61dd4d25ea95869fd97b9a10c0520b7172051a
SHA51210f016bd388fc9e60ed593fdfe98952d65052f3a84eea15140509a0a1b7305926a180cf6d6b3c92837bdbe7a5a778d1bf1e1f68049cff0dc2bfa2a48c7334766
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD50d01d25270f4ae0c8e76cc427f9170b1
SHA1fa16ebad7ae8e69e2eadf4c5f5745b647db452f8
SHA2565c8e69d00560da921b0bc6e50a6456a1d91c6f3352e0d896093241bb3c82f4b6
SHA5122679c708ee1df64ed9e2e7e2a26bb5f631d5e864b2ca70db30ba8171476102ba3f2fb983f1df6ae48001ac0a8adf62f9183b081c4a8e1e1bf60aa1acbe284d40
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0
-
Filesize
72KB
MD508f650443ab92083411b4d03140b60f1
SHA1eb3fa5a9ba9d4d45c963ee9785423ee676dcf3e8
SHA256d1213b9c482221407dfd57864ad75cbe645728a54f1dc0f87e8aa5406e3a49f7
SHA512d23e4b26fc63d23f22b5e5b42337f6483e5e317fe128bc9fffb5757ebee9d43b40f9075f1af9c82d00ec5358adc4d30c60a93fe7496cb0ee871330b0576dbba0