Analysis
-
max time kernel
71s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 20:13
Static task
static1
Behavioral task
behavioral1
Sample
6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe
Resource
win10v2004-20220812-en
General
-
Target
6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe
-
Size
72KB
-
MD5
08d5e79eefde9845dd789f9af3dd758f
-
SHA1
27d07e902081cc558108eed6a30142e632f2c5d1
-
SHA256
6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337
-
SHA512
f654c65ba5c7440e404d0847bf01d7f68c9f6ffc13715f5486ab336fc03911db94ada28ccd6e8538aa28e67d7ba715a7d0a2886d3024a9d0d12a6926b4ec4475
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2J:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrP9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" DllHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" DllHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" DllHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1952 backup.exe 1376 backup.exe 1124 backup.exe 1748 backup.exe 1800 backup.exe 1428 backup.exe 1968 backup.exe 1948 backup.exe 1088 backup.exe 1592 backup.exe 1752 backup.exe 576 update.exe 1444 backup.exe 1236 backup.exe 268 update.exe 1532 backup.exe 1788 backup.exe 956 backup.exe 1736 backup.exe 2044 backup.exe 1224 backup.exe 1892 System Restore.exe 1472 backup.exe 552 backup.exe 780 backup.exe 316 backup.exe 616 data.exe 1140 backup.exe 1504 backup.exe 1900 backup.exe 1924 backup.exe 840 backup.exe 564 backup.exe 1692 backup.exe 472 backup.exe 936 backup.exe 1972 backup.exe 784 backup.exe 1936 backup.exe 1784 backup.exe 1572 backup.exe 880 backup.exe 1180 backup.exe 1696 backup.exe 1040 backup.exe 1748 update.exe 1324 update.exe 1676 backup.exe 1948 backup.exe 1836 backup.exe 1968 backup.exe 1140 backup.exe 700 backup.exe 672 DllHost.exe 1924 data.exe 1192 backup.exe 1440 backup.exe 564 backup.exe 1624 backup.exe 1644 backup.exe 1972 backup.exe 1760 backup.exe 1572 backup.exe 856 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1428 backup.exe 1428 backup.exe 1948 backup.exe 1948 backup.exe 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1428 backup.exe 1428 backup.exe 1592 backup.exe 1592 backup.exe 1752 backup.exe 1752 backup.exe 1592 backup.exe 1592 backup.exe 1428 backup.exe 1592 backup.exe 1592 backup.exe 1236 backup.exe 1236 backup.exe 268 update.exe 576 update.exe 1788 backup.exe 1788 backup.exe 1532 backup.exe 1532 backup.exe 576 update.exe 268 update.exe 576 update.exe 268 update.exe 1788 backup.exe 1788 backup.exe 268 update.exe 268 update.exe 1532 backup.exe 1224 backup.exe 1224 backup.exe 1224 backup.exe 1532 backup.exe 1224 backup.exe 1532 backup.exe 1224 backup.exe 1532 backup.exe 2044 backup.exe 2044 backup.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe 1472 backup.exe 1532 backup.exe 1472 backup.exe 2044 backup.exe 1532 backup.exe 2044 backup.exe -
Drops file in Program Files directory 60 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Push\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\data.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 1952 backup.exe 1376 backup.exe 1124 backup.exe 1748 backup.exe 1800 backup.exe 1428 backup.exe 1968 backup.exe 1948 backup.exe 1088 backup.exe 1592 backup.exe 1752 backup.exe 1444 backup.exe 1236 backup.exe 1532 backup.exe 1788 backup.exe 956 backup.exe 268 update.exe 1736 backup.exe 576 update.exe 2044 backup.exe 1224 backup.exe 1892 System Restore.exe 780 backup.exe 552 backup.exe 1472 backup.exe 616 data.exe 316 backup.exe 1140 backup.exe 1900 backup.exe 1924 backup.exe 1504 backup.exe 840 backup.exe 1692 backup.exe 472 backup.exe 564 backup.exe 936 backup.exe 1972 backup.exe 784 backup.exe 1936 backup.exe 1572 backup.exe 1784 backup.exe 880 backup.exe 1180 backup.exe 1696 backup.exe 1040 backup.exe 1748 update.exe 1324 update.exe 1676 backup.exe 1948 backup.exe 1836 backup.exe 1968 backup.exe 1140 backup.exe 700 backup.exe 672 DllHost.exe 1924 data.exe 1440 backup.exe 1192 backup.exe 564 backup.exe 1624 backup.exe 1972 backup.exe 1644 backup.exe 1760 backup.exe 1572 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 1952 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 28 PID 1456 wrote to memory of 1952 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 28 PID 1456 wrote to memory of 1952 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 28 PID 1456 wrote to memory of 1952 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 28 PID 1456 wrote to memory of 1376 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 29 PID 1456 wrote to memory of 1376 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 29 PID 1456 wrote to memory of 1376 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 29 PID 1456 wrote to memory of 1376 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 29 PID 1456 wrote to memory of 1124 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 30 PID 1456 wrote to memory of 1124 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 30 PID 1456 wrote to memory of 1124 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 30 PID 1456 wrote to memory of 1124 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 30 PID 1456 wrote to memory of 1748 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 31 PID 1456 wrote to memory of 1748 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 31 PID 1456 wrote to memory of 1748 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 31 PID 1456 wrote to memory of 1748 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 31 PID 1456 wrote to memory of 1800 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 32 PID 1456 wrote to memory of 1800 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 32 PID 1456 wrote to memory of 1800 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 32 PID 1456 wrote to memory of 1800 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 32 PID 1952 wrote to memory of 1428 1952 backup.exe 33 PID 1952 wrote to memory of 1428 1952 backup.exe 33 PID 1952 wrote to memory of 1428 1952 backup.exe 33 PID 1952 wrote to memory of 1428 1952 backup.exe 33 PID 1456 wrote to memory of 1968 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 34 PID 1456 wrote to memory of 1968 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 34 PID 1456 wrote to memory of 1968 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 34 PID 1456 wrote to memory of 1968 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 34 PID 1428 wrote to memory of 1948 1428 backup.exe 35 PID 1428 wrote to memory of 1948 1428 backup.exe 35 PID 1428 wrote to memory of 1948 1428 backup.exe 35 PID 1428 wrote to memory of 1948 1428 backup.exe 35 PID 1948 wrote to memory of 1088 1948 backup.exe 36 PID 1948 wrote to memory of 1088 1948 backup.exe 36 PID 1948 wrote to memory of 1088 1948 backup.exe 36 PID 1948 wrote to memory of 1088 1948 backup.exe 36 PID 1428 wrote to memory of 1592 1428 backup.exe 38 PID 1428 wrote to memory of 1592 1428 backup.exe 38 PID 1428 wrote to memory of 1592 1428 backup.exe 38 PID 1428 wrote to memory of 1592 1428 backup.exe 38 PID 1592 wrote to memory of 1752 1592 backup.exe 39 PID 1592 wrote to memory of 1752 1592 backup.exe 39 PID 1592 wrote to memory of 1752 1592 backup.exe 39 PID 1592 wrote to memory of 1752 1592 backup.exe 39 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1456 wrote to memory of 576 1456 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe 37 PID 1752 wrote to memory of 1444 1752 backup.exe 40 PID 1752 wrote to memory of 1444 1752 backup.exe 40 PID 1752 wrote to memory of 1444 1752 backup.exe 40 PID 1752 wrote to memory of 1444 1752 backup.exe 40 PID 1592 wrote to memory of 1236 1592 backup.exe 41 PID 1592 wrote to memory of 1236 1592 backup.exe 41 PID 1592 wrote to memory of 1236 1592 backup.exe 41 PID 1592 wrote to memory of 1236 1592 backup.exe 41 PID 1428 wrote to memory of 268 1428 backup.exe 42 PID 1428 wrote to memory of 268 1428 backup.exe 42 PID 1428 wrote to memory of 268 1428 backup.exe 42 PID 1428 wrote to memory of 268 1428 backup.exe 42 PID 1428 wrote to memory of 268 1428 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe"C:\Users\Admin\AppData\Local\Temp\6c2ee7ef2c73b7c7c077d8fe49091a0b6c3aad4831c19db01f8b8dad6ca9b337.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\2599592357\backup.exeC:\Users\Admin\AppData\Local\Temp\2599592357\backup.exe C:\Users\Admin\AppData\Local\Temp\2599592357\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1952 -
C:\backup.exe\backup.exe \3⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1428 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1948 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1088
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1752 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1444
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1236 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:956
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2044 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1900
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵PID:2036
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵PID:1516
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1784
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1016
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵PID:1016
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:1264
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:1160
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1736
-
-
C:\Program Files\DVD Maker\en-US\System Restore.exe"C:\Program Files\DVD Maker\en-US\System Restore.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1892
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552
-
-
C:\Program Files\DVD Maker\fr-FR\data.exe"C:\Program Files\DVD Maker\fr-FR\data.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:840
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:472 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:880
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\update.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\update.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:700
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\8⤵PID:672
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1440
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Push\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Push\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Push\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:856
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:300
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1324
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\SpecialOccasion\8⤵PID:1520
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Sports\8⤵PID:2008
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Stacking\8⤵PID:280
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\data.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\data.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\VideoWall\8⤵PID:524
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\8⤵PID:1712
-
-
-
-
-
C:\Program Files\Google\System Restore.exe"C:\Program Files\Google\System Restore.exe" C:\Program Files\Google\5⤵PID:568
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1892
-
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1968
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:564
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵PID:776
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:1692
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\System Restore.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\System Restore.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1620
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1292
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:1532
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:556
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1040
-
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:1612
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1584
-
-
C:\Program Files\Microsoft Office\update.exe"C:\Program Files\Microsoft Office\update.exe" C:\Program Files\Microsoft Office\5⤵PID:612
-
-
-
C:\Program Files (x86)\update.exe"C:\Program Files (x86)\update.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1224 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1472 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:316
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1696 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Executes dropped EXE
PID:1140
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1192 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵PID:1624
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵PID:1644
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
PID:836 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵PID:1696
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Drops file in Program Files directory
- System policy modification
PID:1676 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵PID:592
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵PID:1588
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1644 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵PID:880
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1800
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1696
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1688
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1656
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1520
-
C:\Program Files (x86)\Common Files\Adobe\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:1756
-
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:1948
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:1980
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe AIR\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:956
-
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵PID:524
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1636
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1908
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:1896
-
-
-
C:\Program Files (x86)\Google\System Restore.exe"C:\Program Files (x86)\Google\System Restore.exe" C:\Program Files (x86)\Google\5⤵PID:1376
-
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1740
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1192
-
-
-
C:\Program Files (x86)\Internet Explorer\update.exe"C:\Program Files (x86)\Internet Explorer\update.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:300
-
-
C:\Program Files (x86)\Microsoft Analysis Services\data.exe"C:\Program Files (x86)\Microsoft Analysis Services\data.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:916
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:1300
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- System policy modification
PID:1736 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
PID:1084
-
-
C:\Users\Admin\Desktop\System Restore.exe"C:\Users\Admin\Desktop\System Restore.exe" C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
PID:1748
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1556
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1764
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1036
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1652
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1356
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1480
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:1300
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵PID:1636
-
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵PID:616
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1600
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:1652
-
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:700
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\update.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56de9b5cbffa9bc5b0b648fa42efcf8db
SHA15fe146a1db532aa68204d14f40810ce6f286c590
SHA256e60ea0f627185c8753802fdab7e98c5b6f67f6c6ab74eb4b35edf1ad956d6abf
SHA512f4c5f27ad7f5a4d964546e7bf61004b0c29a90dc72fb8552234fe0f3c39ec139fc637e5ea5be8983c6430e7f691a5560d403daed9a0f9d340741b275e6d5137f
-
Filesize
72KB
MD5624a6ae3873ba725a879c54f31568b70
SHA19f79ce1e72253418c9c0dfd66632a6e1d52c6622
SHA256654bcb786b809e57a28c2674bb1a704426b2d54a7b06ee1eef23f6c775b08c40
SHA51268a75c3dfeca094517b7efa8f6cebfbe2a93e5c83f986291fc767b4b3d6167e99e15bc6fe4cfbfe1784a44f9614f6709d9251b09f85d8e2a54abc287cfc8f7f6
-
Filesize
72KB
MD5624a6ae3873ba725a879c54f31568b70
SHA19f79ce1e72253418c9c0dfd66632a6e1d52c6622
SHA256654bcb786b809e57a28c2674bb1a704426b2d54a7b06ee1eef23f6c775b08c40
SHA51268a75c3dfeca094517b7efa8f6cebfbe2a93e5c83f986291fc767b4b3d6167e99e15bc6fe4cfbfe1784a44f9614f6709d9251b09f85d8e2a54abc287cfc8f7f6
-
Filesize
72KB
MD589a87dfc98f3064358fe037fff340ed1
SHA15f8f9087781fe124aa31983c79876d9b0d08a874
SHA2561433b19e0701b99e54b7497bcf6940270816727696f097b487f5367d238a55e0
SHA512bdd58346598d4d496ff0132fe47861c410d503261ce7a99e376e2fa253486cd44c11308c9901c793a61a82f1fc20d3b5dbb73cee7738db7290c0e4326253b9c0
-
Filesize
72KB
MD589a87dfc98f3064358fe037fff340ed1
SHA15f8f9087781fe124aa31983c79876d9b0d08a874
SHA2561433b19e0701b99e54b7497bcf6940270816727696f097b487f5367d238a55e0
SHA512bdd58346598d4d496ff0132fe47861c410d503261ce7a99e376e2fa253486cd44c11308c9901c793a61a82f1fc20d3b5dbb73cee7738db7290c0e4326253b9c0
-
Filesize
72KB
MD5db8249bb3eb24ac8d88532e7ed456011
SHA11036effebfc0239907c6d5224818f63c781e3c8d
SHA256edc15734d4f52b7be916905ff7f96e4da39425eb7a17345729064b34406560ab
SHA512ca95289720f51e3383f3b5e158ef5ef2d5e126bbddacdbb476cfd42b11ea1d217239c1230355fe957aca3977e04f8e9a91470cde1b39f2fd230e2c3071b608a4
-
Filesize
72KB
MD5c455d9e9ec3cf4c0083159de18e8c520
SHA127390e706acc8a98e54edeaa5a9fc5ffaf7e85f4
SHA256ac52eae68c885dd843d90cdcaee60c67e5ff0baba0948c9d1fd57fd8cfb82d87
SHA512f8c2641997d10310591ab8b35887760e407524da123c951258a2bf4bf0f29dc900be30377fc301c2058a3fe7518fb44d51523288891cc13f915f6da832598e43
-
Filesize
72KB
MD5c455d9e9ec3cf4c0083159de18e8c520
SHA127390e706acc8a98e54edeaa5a9fc5ffaf7e85f4
SHA256ac52eae68c885dd843d90cdcaee60c67e5ff0baba0948c9d1fd57fd8cfb82d87
SHA512f8c2641997d10310591ab8b35887760e407524da123c951258a2bf4bf0f29dc900be30377fc301c2058a3fe7518fb44d51523288891cc13f915f6da832598e43
-
Filesize
72KB
MD5d21e91c591976e4ab1891a03f70644da
SHA101bfab372036d89d576fa1c320185bb41afae5be
SHA256761c1178f0ae80db042d4d874227ad5ecab783f181cbafd40810ed72a62ca77e
SHA5128d1952b27968ee3e7e9cde2f427c85f134121f42f50e4770198780aab548c6ab1b26b0eefe4c9ee27aa291c545e11a35704ad9c6cc4db82cb3e182eb5ad99362
-
Filesize
72KB
MD58c884ea405ad8906aec5b5c9035a319f
SHA17275714a5f7b088b972c683ccbda25e436641134
SHA2566af0d1fa651f3b8369486174b4c301acdb18a2c29e8dbe9de8f35ef47fce096e
SHA5126209c47d8f462ae3b7c9e0a966a070918092c130d9bad478466a3d5ac81be69c1f3ca9d8ab44ccad3557d9cb4d5ac54ce5b4a1d48a1643e0a821ee2180bb613a
-
Filesize
72KB
MD58c884ea405ad8906aec5b5c9035a319f
SHA17275714a5f7b088b972c683ccbda25e436641134
SHA2566af0d1fa651f3b8369486174b4c301acdb18a2c29e8dbe9de8f35ef47fce096e
SHA5126209c47d8f462ae3b7c9e0a966a070918092c130d9bad478466a3d5ac81be69c1f3ca9d8ab44ccad3557d9cb4d5ac54ce5b4a1d48a1643e0a821ee2180bb613a
-
Filesize
72KB
MD55e6cb68d518e75f446c39779f5c29540
SHA1507e5a32084a0b77872f3b03ba8ba662e440d7ec
SHA2564a73c007309f26c2501a0e6ed39d19fbe5279edeb0464f10ff0596dc2c428b4d
SHA5128e805a939b3a721b4a37c9c631b9713beb6984dafe1862b9b2d7f65ef39a6361dfeb367f0200a3f5c2692e22cd3f59fcffdf61fd38653c5c712041a89157c982
-
Filesize
72KB
MD55e6cb68d518e75f446c39779f5c29540
SHA1507e5a32084a0b77872f3b03ba8ba662e440d7ec
SHA2564a73c007309f26c2501a0e6ed39d19fbe5279edeb0464f10ff0596dc2c428b4d
SHA5128e805a939b3a721b4a37c9c631b9713beb6984dafe1862b9b2d7f65ef39a6361dfeb367f0200a3f5c2692e22cd3f59fcffdf61fd38653c5c712041a89157c982
-
Filesize
72KB
MD593ea405a2c2c41dbaf42b1c13f200385
SHA16999525eb94099e80557f744f9001f8d73fffe47
SHA256e03f8220ab3b5b525931cba6d92dc5ae29e00626262814718022fddd60d70df4
SHA512146f1b534ed72bcd7a2f1aec56598231364c0800cf0a032460d0951ec6e538285ffe2dd80c34bfeef35544b498a3b83f74fb194e4e4113f78a85d4dc1356d191
-
Filesize
72KB
MD593ea405a2c2c41dbaf42b1c13f200385
SHA16999525eb94099e80557f744f9001f8d73fffe47
SHA256e03f8220ab3b5b525931cba6d92dc5ae29e00626262814718022fddd60d70df4
SHA512146f1b534ed72bcd7a2f1aec56598231364c0800cf0a032460d0951ec6e538285ffe2dd80c34bfeef35544b498a3b83f74fb194e4e4113f78a85d4dc1356d191
-
Filesize
72KB
MD573654292f9dcd5202b00da5a47f241ed
SHA191498997b4ec8c66bfc482661d7ffb4c4c29a064
SHA256ba77c7c7e7a7ff027d02d9def5eac551220ab40c4e6e9ff1876f153d051e9ee4
SHA512ff6df3c5cc79c4bdbb2e156ec8c735bc8efcec1663be17788f8c0a0a666fcb316c2e9cba20d2c8972a8509f6947aae1567cc43234ab2c2712544678b84bac33f
-
Filesize
72KB
MD573654292f9dcd5202b00da5a47f241ed
SHA191498997b4ec8c66bfc482661d7ffb4c4c29a064
SHA256ba77c7c7e7a7ff027d02d9def5eac551220ab40c4e6e9ff1876f153d051e9ee4
SHA512ff6df3c5cc79c4bdbb2e156ec8c735bc8efcec1663be17788f8c0a0a666fcb316c2e9cba20d2c8972a8509f6947aae1567cc43234ab2c2712544678b84bac33f
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c1736e01ae27542a0d05fe90447f809
SHA1b712e5708c49f97cbe7c76ba2af5a9b7e749c1f8
SHA256ee0c5102cd3f1b612cd05eaf32991c0d58e043846d5f7be0e2333e57594e3ea0
SHA512fc65920c77898be819d6eaa92b6319d874a47fd5c075ce783b5ff7c7520163c895e502b14cdf2143df1a252b7707ecc939de91ab1183778ee57adf8e46b8128a
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5b59bcbcb2d755a092cdb82095635b257
SHA1a45efc312165ea767d9efb58660463a84dd0d3e5
SHA256b3e8cc5051e7e7038892baf9d54783988bf1e491cd5f2ff1576637e035278538
SHA5128d1abe05824898932e3acbe1d571498b6ab21173a6c7eb07accf7531cb9ae386ba815ddc342631c9307b9032929d14bbd34d9938472c48d9ce3628aca0b0a1cb
-
Filesize
72KB
MD5b59bcbcb2d755a092cdb82095635b257
SHA1a45efc312165ea767d9efb58660463a84dd0d3e5
SHA256b3e8cc5051e7e7038892baf9d54783988bf1e491cd5f2ff1576637e035278538
SHA5128d1abe05824898932e3acbe1d571498b6ab21173a6c7eb07accf7531cb9ae386ba815ddc342631c9307b9032929d14bbd34d9938472c48d9ce3628aca0b0a1cb
-
Filesize
72KB
MD56de9b5cbffa9bc5b0b648fa42efcf8db
SHA15fe146a1db532aa68204d14f40810ce6f286c590
SHA256e60ea0f627185c8753802fdab7e98c5b6f67f6c6ab74eb4b35edf1ad956d6abf
SHA512f4c5f27ad7f5a4d964546e7bf61004b0c29a90dc72fb8552234fe0f3c39ec139fc637e5ea5be8983c6430e7f691a5560d403daed9a0f9d340741b275e6d5137f
-
Filesize
72KB
MD56de9b5cbffa9bc5b0b648fa42efcf8db
SHA15fe146a1db532aa68204d14f40810ce6f286c590
SHA256e60ea0f627185c8753802fdab7e98c5b6f67f6c6ab74eb4b35edf1ad956d6abf
SHA512f4c5f27ad7f5a4d964546e7bf61004b0c29a90dc72fb8552234fe0f3c39ec139fc637e5ea5be8983c6430e7f691a5560d403daed9a0f9d340741b275e6d5137f
-
Filesize
72KB
MD5624a6ae3873ba725a879c54f31568b70
SHA19f79ce1e72253418c9c0dfd66632a6e1d52c6622
SHA256654bcb786b809e57a28c2674bb1a704426b2d54a7b06ee1eef23f6c775b08c40
SHA51268a75c3dfeca094517b7efa8f6cebfbe2a93e5c83f986291fc767b4b3d6167e99e15bc6fe4cfbfe1784a44f9614f6709d9251b09f85d8e2a54abc287cfc8f7f6
-
Filesize
72KB
MD5624a6ae3873ba725a879c54f31568b70
SHA19f79ce1e72253418c9c0dfd66632a6e1d52c6622
SHA256654bcb786b809e57a28c2674bb1a704426b2d54a7b06ee1eef23f6c775b08c40
SHA51268a75c3dfeca094517b7efa8f6cebfbe2a93e5c83f986291fc767b4b3d6167e99e15bc6fe4cfbfe1784a44f9614f6709d9251b09f85d8e2a54abc287cfc8f7f6
-
Filesize
72KB
MD589a87dfc98f3064358fe037fff340ed1
SHA15f8f9087781fe124aa31983c79876d9b0d08a874
SHA2561433b19e0701b99e54b7497bcf6940270816727696f097b487f5367d238a55e0
SHA512bdd58346598d4d496ff0132fe47861c410d503261ce7a99e376e2fa253486cd44c11308c9901c793a61a82f1fc20d3b5dbb73cee7738db7290c0e4326253b9c0
-
Filesize
72KB
MD589a87dfc98f3064358fe037fff340ed1
SHA15f8f9087781fe124aa31983c79876d9b0d08a874
SHA2561433b19e0701b99e54b7497bcf6940270816727696f097b487f5367d238a55e0
SHA512bdd58346598d4d496ff0132fe47861c410d503261ce7a99e376e2fa253486cd44c11308c9901c793a61a82f1fc20d3b5dbb73cee7738db7290c0e4326253b9c0
-
Filesize
72KB
MD5db8249bb3eb24ac8d88532e7ed456011
SHA11036effebfc0239907c6d5224818f63c781e3c8d
SHA256edc15734d4f52b7be916905ff7f96e4da39425eb7a17345729064b34406560ab
SHA512ca95289720f51e3383f3b5e158ef5ef2d5e126bbddacdbb476cfd42b11ea1d217239c1230355fe957aca3977e04f8e9a91470cde1b39f2fd230e2c3071b608a4
-
Filesize
72KB
MD5db8249bb3eb24ac8d88532e7ed456011
SHA11036effebfc0239907c6d5224818f63c781e3c8d
SHA256edc15734d4f52b7be916905ff7f96e4da39425eb7a17345729064b34406560ab
SHA512ca95289720f51e3383f3b5e158ef5ef2d5e126bbddacdbb476cfd42b11ea1d217239c1230355fe957aca3977e04f8e9a91470cde1b39f2fd230e2c3071b608a4
-
Filesize
72KB
MD5c455d9e9ec3cf4c0083159de18e8c520
SHA127390e706acc8a98e54edeaa5a9fc5ffaf7e85f4
SHA256ac52eae68c885dd843d90cdcaee60c67e5ff0baba0948c9d1fd57fd8cfb82d87
SHA512f8c2641997d10310591ab8b35887760e407524da123c951258a2bf4bf0f29dc900be30377fc301c2058a3fe7518fb44d51523288891cc13f915f6da832598e43
-
Filesize
72KB
MD5c455d9e9ec3cf4c0083159de18e8c520
SHA127390e706acc8a98e54edeaa5a9fc5ffaf7e85f4
SHA256ac52eae68c885dd843d90cdcaee60c67e5ff0baba0948c9d1fd57fd8cfb82d87
SHA512f8c2641997d10310591ab8b35887760e407524da123c951258a2bf4bf0f29dc900be30377fc301c2058a3fe7518fb44d51523288891cc13f915f6da832598e43
-
Filesize
72KB
MD5d21e91c591976e4ab1891a03f70644da
SHA101bfab372036d89d576fa1c320185bb41afae5be
SHA256761c1178f0ae80db042d4d874227ad5ecab783f181cbafd40810ed72a62ca77e
SHA5128d1952b27968ee3e7e9cde2f427c85f134121f42f50e4770198780aab548c6ab1b26b0eefe4c9ee27aa291c545e11a35704ad9c6cc4db82cb3e182eb5ad99362
-
Filesize
72KB
MD5d21e91c591976e4ab1891a03f70644da
SHA101bfab372036d89d576fa1c320185bb41afae5be
SHA256761c1178f0ae80db042d4d874227ad5ecab783f181cbafd40810ed72a62ca77e
SHA5128d1952b27968ee3e7e9cde2f427c85f134121f42f50e4770198780aab548c6ab1b26b0eefe4c9ee27aa291c545e11a35704ad9c6cc4db82cb3e182eb5ad99362
-
Filesize
72KB
MD58c884ea405ad8906aec5b5c9035a319f
SHA17275714a5f7b088b972c683ccbda25e436641134
SHA2566af0d1fa651f3b8369486174b4c301acdb18a2c29e8dbe9de8f35ef47fce096e
SHA5126209c47d8f462ae3b7c9e0a966a070918092c130d9bad478466a3d5ac81be69c1f3ca9d8ab44ccad3557d9cb4d5ac54ce5b4a1d48a1643e0a821ee2180bb613a
-
Filesize
72KB
MD58c884ea405ad8906aec5b5c9035a319f
SHA17275714a5f7b088b972c683ccbda25e436641134
SHA2566af0d1fa651f3b8369486174b4c301acdb18a2c29e8dbe9de8f35ef47fce096e
SHA5126209c47d8f462ae3b7c9e0a966a070918092c130d9bad478466a3d5ac81be69c1f3ca9d8ab44ccad3557d9cb4d5ac54ce5b4a1d48a1643e0a821ee2180bb613a
-
Filesize
72KB
MD55e6cb68d518e75f446c39779f5c29540
SHA1507e5a32084a0b77872f3b03ba8ba662e440d7ec
SHA2564a73c007309f26c2501a0e6ed39d19fbe5279edeb0464f10ff0596dc2c428b4d
SHA5128e805a939b3a721b4a37c9c631b9713beb6984dafe1862b9b2d7f65ef39a6361dfeb367f0200a3f5c2692e22cd3f59fcffdf61fd38653c5c712041a89157c982
-
Filesize
72KB
MD55e6cb68d518e75f446c39779f5c29540
SHA1507e5a32084a0b77872f3b03ba8ba662e440d7ec
SHA2564a73c007309f26c2501a0e6ed39d19fbe5279edeb0464f10ff0596dc2c428b4d
SHA5128e805a939b3a721b4a37c9c631b9713beb6984dafe1862b9b2d7f65ef39a6361dfeb367f0200a3f5c2692e22cd3f59fcffdf61fd38653c5c712041a89157c982
-
Filesize
72KB
MD593ea405a2c2c41dbaf42b1c13f200385
SHA16999525eb94099e80557f744f9001f8d73fffe47
SHA256e03f8220ab3b5b525931cba6d92dc5ae29e00626262814718022fddd60d70df4
SHA512146f1b534ed72bcd7a2f1aec56598231364c0800cf0a032460d0951ec6e538285ffe2dd80c34bfeef35544b498a3b83f74fb194e4e4113f78a85d4dc1356d191
-
Filesize
72KB
MD593ea405a2c2c41dbaf42b1c13f200385
SHA16999525eb94099e80557f744f9001f8d73fffe47
SHA256e03f8220ab3b5b525931cba6d92dc5ae29e00626262814718022fddd60d70df4
SHA512146f1b534ed72bcd7a2f1aec56598231364c0800cf0a032460d0951ec6e538285ffe2dd80c34bfeef35544b498a3b83f74fb194e4e4113f78a85d4dc1356d191
-
Filesize
72KB
MD5f4a5e7a899524db06505b0059f46f787
SHA1f0c8ccb433f4fadc8d5ac4d5677a05b809cdca3a
SHA256c14e52efa0c94c6b874d80b09c482d7e296afec1224182f52a7f44628b5c40d7
SHA51259751f27db97c9d30c5d8a84b0212d564fc14db6e990f8653ba70209c92099026b3e503faa47d29cdc626d8e97fdacfb92527bc1c5f9cc0f1c1f4408c30c5dad
-
Filesize
72KB
MD5f4a5e7a899524db06505b0059f46f787
SHA1f0c8ccb433f4fadc8d5ac4d5677a05b809cdca3a
SHA256c14e52efa0c94c6b874d80b09c482d7e296afec1224182f52a7f44628b5c40d7
SHA51259751f27db97c9d30c5d8a84b0212d564fc14db6e990f8653ba70209c92099026b3e503faa47d29cdc626d8e97fdacfb92527bc1c5f9cc0f1c1f4408c30c5dad
-
Filesize
72KB
MD573654292f9dcd5202b00da5a47f241ed
SHA191498997b4ec8c66bfc482661d7ffb4c4c29a064
SHA256ba77c7c7e7a7ff027d02d9def5eac551220ab40c4e6e9ff1876f153d051e9ee4
SHA512ff6df3c5cc79c4bdbb2e156ec8c735bc8efcec1663be17788f8c0a0a666fcb316c2e9cba20d2c8972a8509f6947aae1567cc43234ab2c2712544678b84bac33f
-
Filesize
72KB
MD573654292f9dcd5202b00da5a47f241ed
SHA191498997b4ec8c66bfc482661d7ffb4c4c29a064
SHA256ba77c7c7e7a7ff027d02d9def5eac551220ab40c4e6e9ff1876f153d051e9ee4
SHA512ff6df3c5cc79c4bdbb2e156ec8c735bc8efcec1663be17788f8c0a0a666fcb316c2e9cba20d2c8972a8509f6947aae1567cc43234ab2c2712544678b84bac33f
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c1736e01ae27542a0d05fe90447f809
SHA1b712e5708c49f97cbe7c76ba2af5a9b7e749c1f8
SHA256ee0c5102cd3f1b612cd05eaf32991c0d58e043846d5f7be0e2333e57594e3ea0
SHA512fc65920c77898be819d6eaa92b6319d874a47fd5c075ce783b5ff7c7520163c895e502b14cdf2143df1a252b7707ecc939de91ab1183778ee57adf8e46b8128a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD52c1736e01ae27542a0d05fe90447f809
SHA1b712e5708c49f97cbe7c76ba2af5a9b7e749c1f8
SHA256ee0c5102cd3f1b612cd05eaf32991c0d58e043846d5f7be0e2333e57594e3ea0
SHA512fc65920c77898be819d6eaa92b6319d874a47fd5c075ce783b5ff7c7520163c895e502b14cdf2143df1a252b7707ecc939de91ab1183778ee57adf8e46b8128a
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5ec883ddf85066a50841a3ce9fefc4e82
SHA1a086ef32c3e775f557e4a8c24ffa5c87655eaaf3
SHA256dfe84043a5bae3325c31defd39bd4e3140ac1b1d50c5ecd01bfd8c1a94359659
SHA512befd262bef820cf5a43e009d72a9457379383b6579ef46d5a716893058494cffe2ff0586ac831976db785751649d530ad25fd825802be84efa306482b52c3409
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96
-
Filesize
72KB
MD5c8722f285332d1d72147460d776f088d
SHA1a4ebbe4727519e05d0d2f9955e35e660f590558b
SHA256b1dd026f0776a3664da5a0db47215b4d9af8bd2a10a8da5151601840eaf54bcb
SHA5128eed97cc9a09b2b25d77a0e4e201a5659b9cb907421f23dab966943273a85a875548d28d57cb1bd0b678a5e9b2415b77e581fe1e00901d1d679c499b52b5fb96