Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
289s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe
Resource
win10v2004-20221111-en
General
-
Target
7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe
-
Size
72KB
-
MD5
0186b3de720fd9c6e6eb32d063e9b6af
-
SHA1
33d7587ef57691d6ff9c85c27399da455da2863d
-
SHA256
7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f
-
SHA512
54e9991d82d45bc609484623e70a120918f274a2bee724e776eb0e687065e857a399f56cb4db967f5c6b681617f678e18f6b021e6c3838deb70a6886af578145
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2A:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 60 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1948 backup.exe 1508 backup.exe 1524 backup.exe 1432 backup.exe 992 backup.exe 1080 backup.exe 1944 backup.exe 284 backup.exe 1972 backup.exe 2028 backup.exe 1728 backup.exe 1912 data.exe 1884 backup.exe 1088 data.exe 1712 backup.exe 828 backup.exe 1600 backup.exe 1572 backup.exe 1204 backup.exe 1768 backup.exe 1432 backup.exe 1624 backup.exe 992 backup.exe 1140 backup.exe 1892 backup.exe 952 backup.exe 2024 backup.exe 336 update.exe 1708 backup.exe 1368 backup.exe 1308 backup.exe 1404 backup.exe 2008 backup.exe 1480 backup.exe 1336 backup.exe 968 data.exe 2016 backup.exe 1412 backup.exe 592 backup.exe 1956 backup.exe 1388 backup.exe 308 backup.exe 1756 backup.exe 872 backup.exe 1696 backup.exe 1668 backup.exe 1528 update.exe 1340 backup.exe 912 backup.exe 532 backup.exe 1812 backup.exe 1636 backup.exe 568 backup.exe 2000 backup.exe 716 data.exe 1716 backup.exe 2020 backup.exe 1584 backup.exe 916 backup.exe 1164 backup.exe 1412 backup.exe 768 backup.exe 1984 backup.exe 584 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 284 backup.exe 284 backup.exe 1972 backup.exe 1972 backup.exe 284 backup.exe 284 backup.exe 1728 backup.exe 1728 backup.exe 1912 data.exe 1912 data.exe 1728 backup.exe 1728 backup.exe 1088 data.exe 1088 data.exe 284 backup.exe 284 backup.exe 1088 data.exe 1088 data.exe 1712 backup.exe 1728 backup.exe 1712 backup.exe 284 backup.exe 284 backup.exe 1728 backup.exe 1088 data.exe 1088 data.exe 1728 backup.exe 1728 backup.exe 1712 backup.exe 1712 backup.exe 1088 data.exe 1088 data.exe 1768 backup.exe 1768 backup.exe 828 backup.exe 1140 backup.exe 828 backup.exe 1140 backup.exe 1624 backup.exe 1204 backup.exe 1204 backup.exe 992 backup.exe 992 backup.exe 1432 backup.exe 1432 backup.exe 336 update.exe 336 update.exe 336 update.exe 1368 backup.exe 1368 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe data.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\data.exe backup.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\en-US\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\update.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\Custom64\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 1948 backup.exe 1508 backup.exe 1524 backup.exe 1432 backup.exe 992 backup.exe 1080 backup.exe 1944 backup.exe 284 backup.exe 1972 backup.exe 2028 backup.exe 1728 backup.exe 1912 data.exe 1884 backup.exe 1088 data.exe 1712 backup.exe 828 backup.exe 1600 backup.exe 1572 backup.exe 1204 backup.exe 1768 backup.exe 1432 backup.exe 992 backup.exe 1624 backup.exe 1140 backup.exe 1892 backup.exe 1368 backup.exe 1708 backup.exe 952 backup.exe 2024 backup.exe 336 update.exe 1308 backup.exe 1404 backup.exe 2008 backup.exe 1412 backup.exe 968 data.exe 1336 backup.exe 1480 backup.exe 2016 backup.exe 592 backup.exe 1956 backup.exe 1696 backup.exe 1756 backup.exe 872 backup.exe 1340 backup.exe 1388 backup.exe 1668 backup.exe 1528 update.exe 308 backup.exe 532 backup.exe 912 backup.exe 1812 backup.exe 1636 backup.exe 2000 backup.exe 568 backup.exe 716 data.exe 1716 backup.exe 2020 backup.exe 1584 backup.exe 584 backup.exe 916 backup.exe 1412 backup.exe 1984 backup.exe 768 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 1948 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 28 PID 556 wrote to memory of 1948 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 28 PID 556 wrote to memory of 1948 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 28 PID 556 wrote to memory of 1948 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 28 PID 556 wrote to memory of 1508 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 29 PID 556 wrote to memory of 1508 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 29 PID 556 wrote to memory of 1508 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 29 PID 556 wrote to memory of 1508 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 29 PID 556 wrote to memory of 1524 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 30 PID 556 wrote to memory of 1524 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 30 PID 556 wrote to memory of 1524 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 30 PID 556 wrote to memory of 1524 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 30 PID 556 wrote to memory of 1432 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 31 PID 556 wrote to memory of 1432 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 31 PID 556 wrote to memory of 1432 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 31 PID 556 wrote to memory of 1432 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 31 PID 556 wrote to memory of 992 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 32 PID 556 wrote to memory of 992 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 32 PID 556 wrote to memory of 992 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 32 PID 556 wrote to memory of 992 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 32 PID 556 wrote to memory of 1080 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 33 PID 556 wrote to memory of 1080 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 33 PID 556 wrote to memory of 1080 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 33 PID 556 wrote to memory of 1080 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 33 PID 556 wrote to memory of 1944 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 34 PID 556 wrote to memory of 1944 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 34 PID 556 wrote to memory of 1944 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 34 PID 556 wrote to memory of 1944 556 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe 34 PID 1948 wrote to memory of 284 1948 backup.exe 35 PID 1948 wrote to memory of 284 1948 backup.exe 35 PID 1948 wrote to memory of 284 1948 backup.exe 35 PID 1948 wrote to memory of 284 1948 backup.exe 35 PID 284 wrote to memory of 1972 284 backup.exe 36 PID 284 wrote to memory of 1972 284 backup.exe 36 PID 284 wrote to memory of 1972 284 backup.exe 36 PID 284 wrote to memory of 1972 284 backup.exe 36 PID 1972 wrote to memory of 2028 1972 backup.exe 37 PID 1972 wrote to memory of 2028 1972 backup.exe 37 PID 1972 wrote to memory of 2028 1972 backup.exe 37 PID 1972 wrote to memory of 2028 1972 backup.exe 37 PID 284 wrote to memory of 1728 284 backup.exe 38 PID 284 wrote to memory of 1728 284 backup.exe 38 PID 284 wrote to memory of 1728 284 backup.exe 38 PID 284 wrote to memory of 1728 284 backup.exe 38 PID 1728 wrote to memory of 1912 1728 backup.exe 39 PID 1728 wrote to memory of 1912 1728 backup.exe 39 PID 1728 wrote to memory of 1912 1728 backup.exe 39 PID 1728 wrote to memory of 1912 1728 backup.exe 39 PID 1912 wrote to memory of 1884 1912 data.exe 40 PID 1912 wrote to memory of 1884 1912 data.exe 40 PID 1912 wrote to memory of 1884 1912 data.exe 40 PID 1912 wrote to memory of 1884 1912 data.exe 40 PID 1728 wrote to memory of 1088 1728 backup.exe 41 PID 1728 wrote to memory of 1088 1728 backup.exe 41 PID 1728 wrote to memory of 1088 1728 backup.exe 41 PID 1728 wrote to memory of 1088 1728 backup.exe 41 PID 1088 wrote to memory of 1712 1088 data.exe 42 PID 1088 wrote to memory of 1712 1088 data.exe 42 PID 1088 wrote to memory of 1712 1088 data.exe 42 PID 1088 wrote to memory of 1712 1088 data.exe 42 PID 284 wrote to memory of 828 284 backup.exe 43 PID 284 wrote to memory of 828 284 backup.exe 43 PID 284 wrote to memory of 828 284 backup.exe 43 PID 284 wrote to memory of 828 284 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe"C:\Users\Admin\AppData\Local\Temp\7824852e26ab97c69ac6a87609d2a46480ef2d1222ffad79b06e472b97438f4f.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:556 -
C:\Users\Admin\AppData\Local\Temp\209717648\backup.exeC:\Users\Admin\AppData\Local\Temp\209717648\backup.exe C:\Users\Admin\AppData\Local\Temp\209717648\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:284 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1972 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Program Files\7-Zip\data.exe"C:\Program Files\7-Zip\data.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1912 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1884
-
-
-
C:\Program Files\Common Files\data.exe"C:\Program Files\Common Files\data.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1088 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2016
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵PID:1340
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:1896
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵PID:1964
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1640
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1432 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1404
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1480 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1372
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:308
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:868
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:872
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:284
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024
-
-
C:\Program Files\DVD Maker\en-US\data.exe"C:\Program Files\DVD Maker\en-US\data.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:308
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1412
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:2044
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:972
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:592 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:912
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:916
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵PID:1528
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1632
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:532
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Executes dropped EXE
PID:1164
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1600
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:1392
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1812
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1816
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1336 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:872
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:912
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:1692
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:900
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1932
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1936
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1704
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1204 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
C:\Users\Admin\Desktop\update.exeC:\Users\Admin\Desktop\update.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:568
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768
-
-
C:\Users\Admin\Favorites\update.exeC:\Users\Admin\Favorites\update.exe C:\Users\Admin\Favorites\6⤵PID:1224
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1020
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1432
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624 -
C:\Windows\addins\update.exeC:\Windows\addins\update.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:336
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1412
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1388 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1636
-
-
C:\Windows\AppPatch\Custom\backup.exeC:\Windows\AppPatch\Custom\backup.exe C:\Windows\AppPatch\Custom\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584 -
C:\Windows\AppPatch\Custom\Custom64\backup.exeC:\Windows\AppPatch\Custom\Custom64\backup.exe C:\Windows\AppPatch\Custom\Custom64\7⤵PID:1648
-
-
-
C:\Windows\AppPatch\de-DE\backup.exeC:\Windows\AppPatch\de-DE\backup.exe C:\Windows\AppPatch\de-DE\6⤵PID:532
-
-
C:\Windows\AppPatch\en-US\backup.exeC:\Windows\AppPatch\en-US\backup.exe C:\Windows\AppPatch\en-US\6⤵PID:1928
-
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:1424
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1080
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5d1f779853525f2d1eda73a6ee9601ede
SHA1eadd50e2ec28bd96578c09dbed12defd8c97c7c7
SHA25616e77019c7b30e07c2bb01e22cbb09d52984cfee547af2d4d52420d7182f6fc5
SHA5128ec0028267ba3449fa8a88dabbff2b7c8372d13758304a548207f1371356e6fc25ffc9ca780b8f334a6ecfab1d65b4512fcdc24307da30f55b6e69e97090d545
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5e8b8a66764ea33fb3f981126b0dc4e82
SHA163ccb15b1f1f2f4bc60aaaf3ffc53dc3383ade9a
SHA256f11a67a5b0df733434737bb1b426c60288563aa3644d26b9072ec380a4259753
SHA512bc1dc6b1b937bc57de07d3b86ebeb462451540d84df439a44f6d67d19a98edeaed8ef390ad1f9e3e010ffdebb6a60fed10e2e6e0a78b87e7bcdf3c067649ff89
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD59dc50d8bba944b2177c08a91f102f382
SHA1746b17903febcf130a1ad24926aeb2f9bf074e43
SHA256140e555410476e15789815a515df7c02bafd170de1fcc129d3d978f151c4bbbe
SHA512745bbf1bad3e32888ea7c6eba3f9968d910a5e6b54be4e749cf9026cdd5474f2a3a82a42176cc2458e3ec61f8cecd5b04a3f354c6a249516b6a56d1b749aceb3
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5c3247242e0cad171f0fdfedd77e947bf
SHA1cd6ae4138e00001da810ab6e26403f04a50d27a5
SHA2564d44840344789c92160a1383ecaf0759ac197c640bf51b76b928bde9f230f05f
SHA512a0e07906fedae5ab681f5167b7e0345184959988231317bcd0bb5aeecd1128ebba9dfba2eb1d853565eba7d427ae3fd271fb05dbf1fad13484be9a3eef79bd94
-
Filesize
72KB
MD5c3247242e0cad171f0fdfedd77e947bf
SHA1cd6ae4138e00001da810ab6e26403f04a50d27a5
SHA2564d44840344789c92160a1383ecaf0759ac197c640bf51b76b928bde9f230f05f
SHA512a0e07906fedae5ab681f5167b7e0345184959988231317bcd0bb5aeecd1128ebba9dfba2eb1d853565eba7d427ae3fd271fb05dbf1fad13484be9a3eef79bd94
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5823ccd1c20931cb20c8d5afd59fb4786
SHA1548c780a17b96c7458ee6ef17e931d314be0a22e
SHA2568349c4ca960248ca784b6ddcb96d6617cf0e7174921feae91ae1719354d82452
SHA5126d6a2aa129860d3a935b1c3ac1d9ca2e5cd65c1c004f6cd84942f64d540206ce9d77e133bb6a1dea6ff184a0fc5e94cbbef1c4e5fab0477f6db8c8f6a35a5493
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD55d6e850aebdcfade84b6718c47f36a0e
SHA1b73c29b9299f3c5532aedffaede885c4fe0a41da
SHA25697fbdb66a2571a50fd0ad7b1f783ba7952a4fdc11df578a75c6c84d17d81ce37
SHA512e5f1c5d94ed6cf319bb735fd327f5786331458467cf40024113a1dde19ecb1ba72c450d00b1967bd73819e913937f3441650bfdd744306ed7b4f9bbaaafc31fd
-
Filesize
72KB
MD54317ad654d91382b9673fd211bd88f8f
SHA17327e36eb3c56c77c3024dcdf533443d0210f5be
SHA25687380eb19b1b6ff366fc6f9196d57c1487d018bb4acb7d4161c872381c50dda8
SHA512a1deea3cf8bc4faf1161e4be3a83318f2f58b99ee14e708112b5092746c20a2338f45928b63f0f2243c6d025b6b97b75c03d61c9363af96fac495e39e81af03d
-
Filesize
72KB
MD54317ad654d91382b9673fd211bd88f8f
SHA17327e36eb3c56c77c3024dcdf533443d0210f5be
SHA25687380eb19b1b6ff366fc6f9196d57c1487d018bb4acb7d4161c872381c50dda8
SHA512a1deea3cf8bc4faf1161e4be3a83318f2f58b99ee14e708112b5092746c20a2338f45928b63f0f2243c6d025b6b97b75c03d61c9363af96fac495e39e81af03d
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5d1f779853525f2d1eda73a6ee9601ede
SHA1eadd50e2ec28bd96578c09dbed12defd8c97c7c7
SHA25616e77019c7b30e07c2bb01e22cbb09d52984cfee547af2d4d52420d7182f6fc5
SHA5128ec0028267ba3449fa8a88dabbff2b7c8372d13758304a548207f1371356e6fc25ffc9ca780b8f334a6ecfab1d65b4512fcdc24307da30f55b6e69e97090d545
-
Filesize
72KB
MD5d1f779853525f2d1eda73a6ee9601ede
SHA1eadd50e2ec28bd96578c09dbed12defd8c97c7c7
SHA25616e77019c7b30e07c2bb01e22cbb09d52984cfee547af2d4d52420d7182f6fc5
SHA5128ec0028267ba3449fa8a88dabbff2b7c8372d13758304a548207f1371356e6fc25ffc9ca780b8f334a6ecfab1d65b4512fcdc24307da30f55b6e69e97090d545
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5e8b8a66764ea33fb3f981126b0dc4e82
SHA163ccb15b1f1f2f4bc60aaaf3ffc53dc3383ade9a
SHA256f11a67a5b0df733434737bb1b426c60288563aa3644d26b9072ec380a4259753
SHA512bc1dc6b1b937bc57de07d3b86ebeb462451540d84df439a44f6d67d19a98edeaed8ef390ad1f9e3e010ffdebb6a60fed10e2e6e0a78b87e7bcdf3c067649ff89
-
Filesize
72KB
MD5e8b8a66764ea33fb3f981126b0dc4e82
SHA163ccb15b1f1f2f4bc60aaaf3ffc53dc3383ade9a
SHA256f11a67a5b0df733434737bb1b426c60288563aa3644d26b9072ec380a4259753
SHA512bc1dc6b1b937bc57de07d3b86ebeb462451540d84df439a44f6d67d19a98edeaed8ef390ad1f9e3e010ffdebb6a60fed10e2e6e0a78b87e7bcdf3c067649ff89
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD5ef7a67e91b574bc8b61bbf4b40f5204f
SHA1dd623d85f889c317d90986b3da1fa54ac5e0da97
SHA2565890a0b69980665f33b5cf844c1e0cd0558140fc91e5a9bbcdf8ee5172669f6a
SHA5129f0676861559a95d8b16a229f56b2d01c2294e1ef8037b2d99564829246de931ffefbc0740aebeabc7f95da54073f4ad37ec27e8c40a3ee601d8fac51b25c647
-
Filesize
72KB
MD59dc50d8bba944b2177c08a91f102f382
SHA1746b17903febcf130a1ad24926aeb2f9bf074e43
SHA256140e555410476e15789815a515df7c02bafd170de1fcc129d3d978f151c4bbbe
SHA512745bbf1bad3e32888ea7c6eba3f9968d910a5e6b54be4e749cf9026cdd5474f2a3a82a42176cc2458e3ec61f8cecd5b04a3f354c6a249516b6a56d1b749aceb3
-
Filesize
72KB
MD59dc50d8bba944b2177c08a91f102f382
SHA1746b17903febcf130a1ad24926aeb2f9bf074e43
SHA256140e555410476e15789815a515df7c02bafd170de1fcc129d3d978f151c4bbbe
SHA512745bbf1bad3e32888ea7c6eba3f9968d910a5e6b54be4e749cf9026cdd5474f2a3a82a42176cc2458e3ec61f8cecd5b04a3f354c6a249516b6a56d1b749aceb3
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD56048a14b971ed5b50aef920378616a96
SHA16c73f21afeb7037e23a7a28a50699091a2fc1a8f
SHA256707046e4b91aa39c1d77e910e9e6865553ee07802a69d5256cfa45537bc8c782
SHA5129ed7bad61f19c3029dccdb76cef6d80079c29e38323924ad8086a9b7f5d0454c102bcc1df88fe22a93893e849fa29662d406174c227d51575f3b687c5fc502a2
-
Filesize
72KB
MD5d94cacce117a42603edbe218029f6150
SHA19a9e1cb8d50103baa9edf0ec6e28d7e2464eeba9
SHA25625674575319899d0bb914519cea02995f1638a06016d8f8b590415d28f803d85
SHA51225d59ccf6525ea80a140567bf0d7909583df7d1733c585bf7e81c20c633f474d604a07986da5c17b27703c8fb2184a66601aa7f1910aa8b90d02cc5f31a08e09
-
Filesize
72KB
MD5d94cacce117a42603edbe218029f6150
SHA19a9e1cb8d50103baa9edf0ec6e28d7e2464eeba9
SHA25625674575319899d0bb914519cea02995f1638a06016d8f8b590415d28f803d85
SHA51225d59ccf6525ea80a140567bf0d7909583df7d1733c585bf7e81c20c633f474d604a07986da5c17b27703c8fb2184a66601aa7f1910aa8b90d02cc5f31a08e09
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5052928200b4a2a5fe5951839b70209a9
SHA16efb8a432e5e55b2d7a186c5e8ee5865409e0559
SHA2568c4cecfdf69dcd7e80fbcfea8d8377f91240513d7dd893e931d21b631c74b58c
SHA5129382ccdf5cae33f058004370fbcc3a67700e066f881801cb7930079e227587a33e6f91caab9e27447122f72bee3b8cca219aced86930fec9ad327d4a5b4a551f
-
Filesize
72KB
MD5c3247242e0cad171f0fdfedd77e947bf
SHA1cd6ae4138e00001da810ab6e26403f04a50d27a5
SHA2564d44840344789c92160a1383ecaf0759ac197c640bf51b76b928bde9f230f05f
SHA512a0e07906fedae5ab681f5167b7e0345184959988231317bcd0bb5aeecd1128ebba9dfba2eb1d853565eba7d427ae3fd271fb05dbf1fad13484be9a3eef79bd94
-
Filesize
72KB
MD5c3247242e0cad171f0fdfedd77e947bf
SHA1cd6ae4138e00001da810ab6e26403f04a50d27a5
SHA2564d44840344789c92160a1383ecaf0759ac197c640bf51b76b928bde9f230f05f
SHA512a0e07906fedae5ab681f5167b7e0345184959988231317bcd0bb5aeecd1128ebba9dfba2eb1d853565eba7d427ae3fd271fb05dbf1fad13484be9a3eef79bd94
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5823ccd1c20931cb20c8d5afd59fb4786
SHA1548c780a17b96c7458ee6ef17e931d314be0a22e
SHA2568349c4ca960248ca784b6ddcb96d6617cf0e7174921feae91ae1719354d82452
SHA5126d6a2aa129860d3a935b1c3ac1d9ca2e5cd65c1c004f6cd84942f64d540206ce9d77e133bb6a1dea6ff184a0fc5e94cbbef1c4e5fab0477f6db8c8f6a35a5493
-
Filesize
72KB
MD5823ccd1c20931cb20c8d5afd59fb4786
SHA1548c780a17b96c7458ee6ef17e931d314be0a22e
SHA2568349c4ca960248ca784b6ddcb96d6617cf0e7174921feae91ae1719354d82452
SHA5126d6a2aa129860d3a935b1c3ac1d9ca2e5cd65c1c004f6cd84942f64d540206ce9d77e133bb6a1dea6ff184a0fc5e94cbbef1c4e5fab0477f6db8c8f6a35a5493
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD5f36721819f8cb5fe9e887249dd12aa24
SHA1e862c046bcf9800d99376bf6281edb9405c45542
SHA256f1fa2d2ce65dc48a63c19acdbefcb7e24ca98920f5ae790cbc9adf57f98407bd
SHA5124957e1697e1d5b432cfcac5fff4590fd6d1ce5c3aaf3065da7c93eaa92096f1f64fac9b749bbdbdd81b06c9f1e6b79b9f8a3c1f26e9ea7b5402789811d5b8064
-
Filesize
72KB
MD55d6e850aebdcfade84b6718c47f36a0e
SHA1b73c29b9299f3c5532aedffaede885c4fe0a41da
SHA25697fbdb66a2571a50fd0ad7b1f783ba7952a4fdc11df578a75c6c84d17d81ce37
SHA512e5f1c5d94ed6cf319bb735fd327f5786331458467cf40024113a1dde19ecb1ba72c450d00b1967bd73819e913937f3441650bfdd744306ed7b4f9bbaaafc31fd
-
Filesize
72KB
MD55d6e850aebdcfade84b6718c47f36a0e
SHA1b73c29b9299f3c5532aedffaede885c4fe0a41da
SHA25697fbdb66a2571a50fd0ad7b1f783ba7952a4fdc11df578a75c6c84d17d81ce37
SHA512e5f1c5d94ed6cf319bb735fd327f5786331458467cf40024113a1dde19ecb1ba72c450d00b1967bd73819e913937f3441650bfdd744306ed7b4f9bbaaafc31fd