Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe
Resource
win10v2004-20220901-en
General
-
Target
aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe
-
Size
72KB
-
MD5
63e603d6a4ec4510b1d29d33ce359f5a
-
SHA1
206beef3ee34c1c733977712711ff7ccf946ff1d
-
SHA256
aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81
-
SHA512
3c299f4055aaf4279339b7c27422e12d69131777621509a3af05441536ae7cf04e985b2930e289fb92505165f92ad1468ab62a998152b5e2aeac859b8bc876ea
-
SSDEEP
768:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrTd/+I9Mp:HeT7BVwxfvqguKp+Sq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1932 backup.exe 1356 backup.exe 1184 backup.exe 1116 backup.exe 1976 backup.exe 584 backup.exe 1824 backup.exe 1488 backup.exe 1408 backup.exe 1960 backup.exe 1640 backup.exe 776 System Restore.exe 1504 backup.exe 1924 backup.exe 568 backup.exe 456 backup.exe 1076 backup.exe 1900 backup.exe 1608 data.exe 1108 backup.exe 1744 backup.exe 1708 data.exe 520 backup.exe 984 backup.exe 636 backup.exe 780 backup.exe 1576 backup.exe 1068 backup.exe 584 backup.exe 1964 backup.exe 1996 backup.exe 1740 backup.exe 1172 backup.exe 1324 System Restore.exe 1208 backup.exe 1556 System Restore.exe 1888 backup.exe 1968 backup.exe 524 backup.exe 1132 backup.exe 864 backup.exe 112 update.exe 696 backup.exe 1612 backup.exe 840 backup.exe 844 backup.exe 1700 backup.exe 1708 backup.exe 520 backup.exe 1768 backup.exe 636 backup.exe 576 backup.exe 1772 backup.exe 1068 backup.exe 1412 backup.exe 1596 backup.exe 1964 backup.exe 980 backup.exe 1688 backup.exe 1888 backup.exe 1556 backup.exe 1984 backup.exe 1716 data.exe 580 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 1184 backup.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 1184 backup.exe 1184 backup.exe 1184 backup.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 1824 backup.exe 1824 backup.exe 1184 backup.exe 1184 backup.exe 1976 backup.exe 1976 backup.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 1408 backup.exe 1408 backup.exe 1960 backup.exe 1960 backup.exe 1824 backup.exe 1824 backup.exe 568 backup.exe 568 backup.exe 456 backup.exe 456 backup.exe 1900 backup.exe 1900 backup.exe 1076 backup.exe 1076 backup.exe 1900 backup.exe 1900 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1076 backup.exe 1076 backup.exe 984 backup.exe 984 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 1744 backup.exe 984 backup.exe 984 backup.exe 984 backup.exe 1744 backup.exe 984 backup.exe 1744 backup.exe 984 backup.exe 984 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe update.exe File opened for modification C:\Program Files (x86)\Google\Update\System Restore.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe backup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 1932 backup.exe 1356 backup.exe 1184 backup.exe 1116 backup.exe 1976 backup.exe 584 backup.exe 1824 backup.exe 1488 backup.exe 1408 backup.exe 1960 backup.exe 1640 backup.exe 776 System Restore.exe 1504 backup.exe 1924 backup.exe 568 backup.exe 456 backup.exe 1076 backup.exe 1900 backup.exe 1608 data.exe 1108 backup.exe 1744 backup.exe 1708 data.exe 520 backup.exe 984 backup.exe 636 backup.exe 780 backup.exe 1576 backup.exe 1068 backup.exe 584 backup.exe 1964 backup.exe 1996 backup.exe 1740 backup.exe 1172 backup.exe 1324 System Restore.exe 1208 backup.exe 1556 System Restore.exe 1888 backup.exe 1968 backup.exe 524 backup.exe 1132 backup.exe 864 backup.exe 696 backup.exe 112 update.exe 1612 backup.exe 840 backup.exe 844 backup.exe 1700 backup.exe 1708 backup.exe 520 backup.exe 1768 backup.exe 636 backup.exe 576 backup.exe 1068 backup.exe 1412 backup.exe 1772 backup.exe 1964 backup.exe 980 backup.exe 1688 backup.exe 1596 backup.exe 1888 backup.exe 1556 backup.exe 1984 backup.exe 1716 data.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 1932 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 27 PID 836 wrote to memory of 1932 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 27 PID 836 wrote to memory of 1932 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 27 PID 836 wrote to memory of 1932 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 27 PID 836 wrote to memory of 1356 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 28 PID 836 wrote to memory of 1356 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 28 PID 836 wrote to memory of 1356 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 28 PID 836 wrote to memory of 1356 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 28 PID 1932 wrote to memory of 1184 1932 backup.exe 29 PID 1932 wrote to memory of 1184 1932 backup.exe 29 PID 1932 wrote to memory of 1184 1932 backup.exe 29 PID 1932 wrote to memory of 1184 1932 backup.exe 29 PID 836 wrote to memory of 1116 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 30 PID 836 wrote to memory of 1116 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 30 PID 836 wrote to memory of 1116 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 30 PID 836 wrote to memory of 1116 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 30 PID 836 wrote to memory of 584 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 31 PID 836 wrote to memory of 584 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 31 PID 836 wrote to memory of 584 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 31 PID 836 wrote to memory of 584 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 31 PID 1184 wrote to memory of 1976 1184 backup.exe 32 PID 1184 wrote to memory of 1976 1184 backup.exe 32 PID 1184 wrote to memory of 1976 1184 backup.exe 32 PID 1184 wrote to memory of 1976 1184 backup.exe 32 PID 1184 wrote to memory of 1824 1184 backup.exe 33 PID 1184 wrote to memory of 1824 1184 backup.exe 33 PID 1184 wrote to memory of 1824 1184 backup.exe 33 PID 1184 wrote to memory of 1824 1184 backup.exe 33 PID 836 wrote to memory of 1488 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 34 PID 836 wrote to memory of 1488 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 34 PID 836 wrote to memory of 1488 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 34 PID 836 wrote to memory of 1488 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 34 PID 1824 wrote to memory of 1408 1824 backup.exe 35 PID 1824 wrote to memory of 1408 1824 backup.exe 35 PID 1824 wrote to memory of 1408 1824 backup.exe 35 PID 1824 wrote to memory of 1408 1824 backup.exe 35 PID 1184 wrote to memory of 1960 1184 backup.exe 36 PID 1184 wrote to memory of 1960 1184 backup.exe 36 PID 1184 wrote to memory of 1960 1184 backup.exe 36 PID 1184 wrote to memory of 1960 1184 backup.exe 36 PID 1976 wrote to memory of 1640 1976 backup.exe 37 PID 1976 wrote to memory of 1640 1976 backup.exe 37 PID 1976 wrote to memory of 1640 1976 backup.exe 37 PID 1976 wrote to memory of 1640 1976 backup.exe 37 PID 836 wrote to memory of 776 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 38 PID 836 wrote to memory of 776 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 38 PID 836 wrote to memory of 776 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 38 PID 836 wrote to memory of 776 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 38 PID 836 wrote to memory of 1504 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 39 PID 836 wrote to memory of 1504 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 39 PID 836 wrote to memory of 1504 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 39 PID 836 wrote to memory of 1504 836 aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe 39 PID 1408 wrote to memory of 1924 1408 backup.exe 40 PID 1408 wrote to memory of 1924 1408 backup.exe 40 PID 1408 wrote to memory of 1924 1408 backup.exe 40 PID 1408 wrote to memory of 1924 1408 backup.exe 40 PID 1960 wrote to memory of 568 1960 backup.exe 41 PID 1960 wrote to memory of 568 1960 backup.exe 41 PID 1960 wrote to memory of 568 1960 backup.exe 41 PID 1960 wrote to memory of 568 1960 backup.exe 41 PID 1824 wrote to memory of 456 1824 backup.exe 42 PID 1824 wrote to memory of 456 1824 backup.exe 42 PID 1824 wrote to memory of 456 1824 backup.exe 42 PID 1824 wrote to memory of 456 1824 backup.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe"C:\Users\Admin\AppData\Local\Temp\aa86be0adb87de6d4aefbc34b266655a935ec212bfb1b77bae014c9242579b81.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:836 -
C:\Users\Admin\AppData\Local\Temp\4165809184\backup.exeC:\Users\Admin\AppData\Local\Temp\4165809184\backup.exe C:\Users\Admin\AppData\Local\Temp\4165809184\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1408 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:456 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1576
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
PID:332
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- System policy modification
PID:1672
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:1068
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- System policy modification
PID:1988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- System policy modification
PID:1488
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1916
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:2016
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:1144
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- System policy modification
PID:832
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1248
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- System policy modification
PID:776 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
PID:828
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
PID:368
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:112
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:2024
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
PID:268
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1688 -
C:\Program Files\Common Files\System\ado\update.exe"C:\Program Files\Common Files\System\ado\update.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:840 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:972
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1108
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1308
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1816
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:2016
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
PID:1692
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1088
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2004
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1984 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
PID:1600
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- System policy modification
PID:1720
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- System policy modification
PID:1360
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1088
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1768
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- System policy modification
PID:1540
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1720 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:1356
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1908 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Drops file in Program Files directory
PID:364 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Drops file in Program Files directory
PID:972 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Drops file in Program Files directory
PID:2040 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵PID:672
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1976
-
-
-
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1960 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1108
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:984 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:636
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1208
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:524 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\10⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1708
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1768 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\10⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\ENU\11⤵
- Modifies visibility of file extensions in Explorer
PID:1604
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Multimedia\MPP\10⤵PID:1736
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\9⤵PID:464
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\10⤵PID:1500
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\prc\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1088
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1548
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1404
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:672
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\System Restore.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\System Restore.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- Modifies visibility of file extensions in Explorer
PID:912
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵
- Drops file in Program Files directory
PID:1208 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\9⤵
- System policy modification
PID:1976
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\9⤵
- System policy modification
PID:1616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\10⤵PID:1940
-
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1604 -
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵PID:1408
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576 -
C:\Program Files (x86)\Common Files\Adobe\data.exe"C:\Program Files (x86)\Common Files\Adobe\data.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1716 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Drops file in Program Files directory
- System policy modification
PID:864
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1496 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵
- System policy modification
PID:1636 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9⤵
- Drops file in Program Files directory
- System policy modification
PID:864 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\10⤵
- System policy modification
PID:636
-
-
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵
- Modifies visibility of file extensions in Explorer
PID:940
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵
- Drops file in Program Files directory
PID:1912 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵
- Drops file in Program Files directory
PID:1556 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\8⤵
- System policy modification
PID:788
-
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵
- Modifies visibility of file extensions in Explorer
PID:1760
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1124
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1736 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1484
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:1924
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:1560
-
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
PID:580 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1296
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- System policy modification
PID:1484
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:844
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
PID:560
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1172
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:844
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- System policy modification
PID:1568
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
PID:2020
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵
- Modifies visibility of file extensions in Explorer
PID:1716
-
-
C:\Users\Admin\Searches\backup.exeC:\Users\Admin\Searches\backup.exe C:\Users\Admin\Searches\6⤵
- System policy modification
PID:844
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:524
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:1632
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- System policy modification
PID:780
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:1296
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:696 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1608
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1484
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD55afa76707c71d3386583b479af19435b
SHA13cbc0fcd7ef3d532b2473270390d2a099d975089
SHA256cb0a8d574a351f2397ca17d19c8ea7c6e9b5904bea2f3c7b66ea30116b27a104
SHA5125397108cd79309c1a059b125746e5cad52bbc08af6cbd18496aaf184ed91a5898d31099e0fdd1ed32795e16ccba2125aa99f864e6aa5f5637d6ff7fc1323903c
-
Filesize
72KB
MD55d947c8702f40cc958aa48937792824e
SHA1424650ffba8507a8189be49b2bd4f03f349762a8
SHA256507a9826c085f6030c6c55554cb89347309e336ee785a389235d666f8b5ccedc
SHA51290deaeb738d8f450231cec4c440659e804811d9392b4cb3f25cb69ec297f1ce5a6915d9005ea3679fcf01aa75106ab6858c39b89a4ea7f4575b1e0d2b539cb7b
-
Filesize
72KB
MD55d947c8702f40cc958aa48937792824e
SHA1424650ffba8507a8189be49b2bd4f03f349762a8
SHA256507a9826c085f6030c6c55554cb89347309e336ee785a389235d666f8b5ccedc
SHA51290deaeb738d8f450231cec4c440659e804811d9392b4cb3f25cb69ec297f1ce5a6915d9005ea3679fcf01aa75106ab6858c39b89a4ea7f4575b1e0d2b539cb7b
-
Filesize
72KB
MD5f93b391267e9622c59bdf0f9ad069746
SHA18895a8953c060e02f3dea04a7b602e8a5119be16
SHA2562d18fff366de407a60dc9aa05fdca369e30cb0dcda4deb485781ca9876e679bd
SHA51220fc5157ba5864f4f515b874c8b044b55638cfe26ac0a88a8b8d8ed263e7bd98652f17d1d0cb924532923fc231c6c76f076def03539c34a9ec5bf1d01673d7e3
-
Filesize
72KB
MD5f93b391267e9622c59bdf0f9ad069746
SHA18895a8953c060e02f3dea04a7b602e8a5119be16
SHA2562d18fff366de407a60dc9aa05fdca369e30cb0dcda4deb485781ca9876e679bd
SHA51220fc5157ba5864f4f515b874c8b044b55638cfe26ac0a88a8b8d8ed263e7bd98652f17d1d0cb924532923fc231c6c76f076def03539c34a9ec5bf1d01673d7e3
-
Filesize
72KB
MD545f9b04b1a907e7556ca59a9d825d5ed
SHA144af7187473681cd85ac0d066212d92416c6a29f
SHA25659edf7eca02be053f4224569dbe22bc7cd2e313ef191d7ee6bfb1492e504d486
SHA512d137db407a69c2862514252018789f75fd2286f4ba8f700343462b512cd401ae546c53a9f383504ce291d41b7e9f89a4df29447f1aae235244e9602d2181f514
-
Filesize
72KB
MD545f9b04b1a907e7556ca59a9d825d5ed
SHA144af7187473681cd85ac0d066212d92416c6a29f
SHA25659edf7eca02be053f4224569dbe22bc7cd2e313ef191d7ee6bfb1492e504d486
SHA512d137db407a69c2862514252018789f75fd2286f4ba8f700343462b512cd401ae546c53a9f383504ce291d41b7e9f89a4df29447f1aae235244e9602d2181f514
-
Filesize
72KB
MD55d2de218212800b7d14b2f29d23e130e
SHA1df6abc1c866de4416c065e60c64d609e6712b090
SHA256d94cf47a0edc364eca699ab296073471544e56d2b839594ed34579901f5e45ca
SHA5123c07abfbdc912be38d6a1ccd658ccac393421308032828b24f03b7bc57a6457222d8fa0b36059f8632e12bc1a6792b5df26affa05890669c30c542c4ca0a8870
-
Filesize
72KB
MD55d2de218212800b7d14b2f29d23e130e
SHA1df6abc1c866de4416c065e60c64d609e6712b090
SHA256d94cf47a0edc364eca699ab296073471544e56d2b839594ed34579901f5e45ca
SHA5123c07abfbdc912be38d6a1ccd658ccac393421308032828b24f03b7bc57a6457222d8fa0b36059f8632e12bc1a6792b5df26affa05890669c30c542c4ca0a8870
-
Filesize
72KB
MD50ad188eeb79502f1965a040917dd06de
SHA1e1cfa58d3b2357c0303a7eb0bfe00d033527055a
SHA256d1f5f3006fda01e1ad488dc5ac0c23e3d2c543672782d42646c71f7c89bc8244
SHA512cc1f8f53f44a64665cd54b19e362d0a3f222405bc5c568b897bf278bf2b46f87a00badde12fca331234728133028a71688c48361007656ee4b315633f822a06a
-
Filesize
72KB
MD540315029eb0788fafb4d7e639106e36a
SHA1bed4789e3246fc78f0ffa011f215e30dca87aa6c
SHA256ac6b665b26c9096900087c34b9ba6aa8a52b4153dbe33f7b0c9e2a87e105a43b
SHA51201aa92553444939b3fc6b8dcc18c291636a2fc10a2354bd8c8342f432f2515905ca2d227401c965b2f58f5874e87eb66c7b48d94c9c15573b4f3f90aa3e605cb
-
Filesize
72KB
MD540315029eb0788fafb4d7e639106e36a
SHA1bed4789e3246fc78f0ffa011f215e30dca87aa6c
SHA256ac6b665b26c9096900087c34b9ba6aa8a52b4153dbe33f7b0c9e2a87e105a43b
SHA51201aa92553444939b3fc6b8dcc18c291636a2fc10a2354bd8c8342f432f2515905ca2d227401c965b2f58f5874e87eb66c7b48d94c9c15573b4f3f90aa3e605cb
-
Filesize
72KB
MD59c120611e79980d36648b64177eccf84
SHA1ed934bd253d0abba3c71e1d2b97e22d88d3152bf
SHA256e88941813d383cabedd4eb09058cfbc798e01f408550df188833d30c62753904
SHA512fcc990f043521ff4c01726c541fb491fac04d97a22907e2c0e8376076e11bc5950defef558dd358bccae5ecb8769ca337ff0089b919c9daa1cb71bb3377e720d
-
Filesize
72KB
MD59c120611e79980d36648b64177eccf84
SHA1ed934bd253d0abba3c71e1d2b97e22d88d3152bf
SHA256e88941813d383cabedd4eb09058cfbc798e01f408550df188833d30c62753904
SHA512fcc990f043521ff4c01726c541fb491fac04d97a22907e2c0e8376076e11bc5950defef558dd358bccae5ecb8769ca337ff0089b919c9daa1cb71bb3377e720d
-
Filesize
72KB
MD564e03c1f1c5f60713cb7f82e496ace62
SHA1ba3ca1de68b2e445a4b8fa031364842193974aab
SHA25632bba709115dd65215332b5c90a482ed967cfd282c7904c2e55bd81032084ef9
SHA512de5a89cde76ecb15592a7b3ce9f924c5bc118a81697a86b29f59de59dedfbf90cbf75e9d96bf6d57a8034fe53e9e636ef85a91203ca4b5816e197061d1f77e8f
-
Filesize
72KB
MD564e03c1f1c5f60713cb7f82e496ace62
SHA1ba3ca1de68b2e445a4b8fa031364842193974aab
SHA25632bba709115dd65215332b5c90a482ed967cfd282c7904c2e55bd81032084ef9
SHA512de5a89cde76ecb15592a7b3ce9f924c5bc118a81697a86b29f59de59dedfbf90cbf75e9d96bf6d57a8034fe53e9e636ef85a91203ca4b5816e197061d1f77e8f
-
Filesize
72KB
MD52664b246adea47f726e20f00e952c6e6
SHA167eaea2a82669536f7bf9fc13c532905c23d6bfb
SHA25666c01c72e39a1cd6c730adcfce44eee8926f1bf09a0db20bfccd74d72c68bdc0
SHA512f7fd87d219f0af8812b5573c0c39ad6840c5252c9b3eb60839707604153a20c507e921ef3a19317135c8a454f0bdc0bc4d9190e9125755690d619e719810a198
-
Filesize
72KB
MD52664b246adea47f726e20f00e952c6e6
SHA167eaea2a82669536f7bf9fc13c532905c23d6bfb
SHA25666c01c72e39a1cd6c730adcfce44eee8926f1bf09a0db20bfccd74d72c68bdc0
SHA512f7fd87d219f0af8812b5573c0c39ad6840c5252c9b3eb60839707604153a20c507e921ef3a19317135c8a454f0bdc0bc4d9190e9125755690d619e719810a198
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5422262f7e9371845dcacfc5db0cb2e46
SHA1ae7f3d8876a4343eb136c64480e31d7f8f383f7a
SHA2562ee283f375c613e0458f8255ce8dbfcb8501f2f45861c50756efb141eb8ab7bb
SHA512bfb04dfc46d6aeb83bed174dbf9dbcb4f374551188db66a8ece00927bd0a176862c1b8f86b314a9d9c49fc88ead22cddbd8e37526996b2f6c4f8bff6ffe454f2
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98
-
Filesize
72KB
MD586c1b538864db2b38ca5f88ffe55274f
SHA1c9a1912fd66b152de5590561f4412f491b314039
SHA2560274b4ade931d9be9855aa58efbfd75bf062fdc0badc91d21e9dc55e9eb519cc
SHA512cda8db9cf30d1061f1c53c20a6186be4eefe00ee5445d53ada4cbc1820659bbc448f980248f710968460996a6336746eba6e22f3c239d7143696704c028be5e4
-
Filesize
72KB
MD586c1b538864db2b38ca5f88ffe55274f
SHA1c9a1912fd66b152de5590561f4412f491b314039
SHA2560274b4ade931d9be9855aa58efbfd75bf062fdc0badc91d21e9dc55e9eb519cc
SHA512cda8db9cf30d1061f1c53c20a6186be4eefe00ee5445d53ada4cbc1820659bbc448f980248f710968460996a6336746eba6e22f3c239d7143696704c028be5e4
-
Filesize
72KB
MD55afa76707c71d3386583b479af19435b
SHA13cbc0fcd7ef3d532b2473270390d2a099d975089
SHA256cb0a8d574a351f2397ca17d19c8ea7c6e9b5904bea2f3c7b66ea30116b27a104
SHA5125397108cd79309c1a059b125746e5cad52bbc08af6cbd18496aaf184ed91a5898d31099e0fdd1ed32795e16ccba2125aa99f864e6aa5f5637d6ff7fc1323903c
-
Filesize
72KB
MD55afa76707c71d3386583b479af19435b
SHA13cbc0fcd7ef3d532b2473270390d2a099d975089
SHA256cb0a8d574a351f2397ca17d19c8ea7c6e9b5904bea2f3c7b66ea30116b27a104
SHA5125397108cd79309c1a059b125746e5cad52bbc08af6cbd18496aaf184ed91a5898d31099e0fdd1ed32795e16ccba2125aa99f864e6aa5f5637d6ff7fc1323903c
-
Filesize
72KB
MD55d947c8702f40cc958aa48937792824e
SHA1424650ffba8507a8189be49b2bd4f03f349762a8
SHA256507a9826c085f6030c6c55554cb89347309e336ee785a389235d666f8b5ccedc
SHA51290deaeb738d8f450231cec4c440659e804811d9392b4cb3f25cb69ec297f1ce5a6915d9005ea3679fcf01aa75106ab6858c39b89a4ea7f4575b1e0d2b539cb7b
-
Filesize
72KB
MD55d947c8702f40cc958aa48937792824e
SHA1424650ffba8507a8189be49b2bd4f03f349762a8
SHA256507a9826c085f6030c6c55554cb89347309e336ee785a389235d666f8b5ccedc
SHA51290deaeb738d8f450231cec4c440659e804811d9392b4cb3f25cb69ec297f1ce5a6915d9005ea3679fcf01aa75106ab6858c39b89a4ea7f4575b1e0d2b539cb7b
-
Filesize
72KB
MD5f93b391267e9622c59bdf0f9ad069746
SHA18895a8953c060e02f3dea04a7b602e8a5119be16
SHA2562d18fff366de407a60dc9aa05fdca369e30cb0dcda4deb485781ca9876e679bd
SHA51220fc5157ba5864f4f515b874c8b044b55638cfe26ac0a88a8b8d8ed263e7bd98652f17d1d0cb924532923fc231c6c76f076def03539c34a9ec5bf1d01673d7e3
-
Filesize
72KB
MD5f93b391267e9622c59bdf0f9ad069746
SHA18895a8953c060e02f3dea04a7b602e8a5119be16
SHA2562d18fff366de407a60dc9aa05fdca369e30cb0dcda4deb485781ca9876e679bd
SHA51220fc5157ba5864f4f515b874c8b044b55638cfe26ac0a88a8b8d8ed263e7bd98652f17d1d0cb924532923fc231c6c76f076def03539c34a9ec5bf1d01673d7e3
-
Filesize
72KB
MD545f9b04b1a907e7556ca59a9d825d5ed
SHA144af7187473681cd85ac0d066212d92416c6a29f
SHA25659edf7eca02be053f4224569dbe22bc7cd2e313ef191d7ee6bfb1492e504d486
SHA512d137db407a69c2862514252018789f75fd2286f4ba8f700343462b512cd401ae546c53a9f383504ce291d41b7e9f89a4df29447f1aae235244e9602d2181f514
-
Filesize
72KB
MD545f9b04b1a907e7556ca59a9d825d5ed
SHA144af7187473681cd85ac0d066212d92416c6a29f
SHA25659edf7eca02be053f4224569dbe22bc7cd2e313ef191d7ee6bfb1492e504d486
SHA512d137db407a69c2862514252018789f75fd2286f4ba8f700343462b512cd401ae546c53a9f383504ce291d41b7e9f89a4df29447f1aae235244e9602d2181f514
-
Filesize
72KB
MD55d2de218212800b7d14b2f29d23e130e
SHA1df6abc1c866de4416c065e60c64d609e6712b090
SHA256d94cf47a0edc364eca699ab296073471544e56d2b839594ed34579901f5e45ca
SHA5123c07abfbdc912be38d6a1ccd658ccac393421308032828b24f03b7bc57a6457222d8fa0b36059f8632e12bc1a6792b5df26affa05890669c30c542c4ca0a8870
-
Filesize
72KB
MD55d2de218212800b7d14b2f29d23e130e
SHA1df6abc1c866de4416c065e60c64d609e6712b090
SHA256d94cf47a0edc364eca699ab296073471544e56d2b839594ed34579901f5e45ca
SHA5123c07abfbdc912be38d6a1ccd658ccac393421308032828b24f03b7bc57a6457222d8fa0b36059f8632e12bc1a6792b5df26affa05890669c30c542c4ca0a8870
-
Filesize
72KB
MD50ad188eeb79502f1965a040917dd06de
SHA1e1cfa58d3b2357c0303a7eb0bfe00d033527055a
SHA256d1f5f3006fda01e1ad488dc5ac0c23e3d2c543672782d42646c71f7c89bc8244
SHA512cc1f8f53f44a64665cd54b19e362d0a3f222405bc5c568b897bf278bf2b46f87a00badde12fca331234728133028a71688c48361007656ee4b315633f822a06a
-
Filesize
72KB
MD50ad188eeb79502f1965a040917dd06de
SHA1e1cfa58d3b2357c0303a7eb0bfe00d033527055a
SHA256d1f5f3006fda01e1ad488dc5ac0c23e3d2c543672782d42646c71f7c89bc8244
SHA512cc1f8f53f44a64665cd54b19e362d0a3f222405bc5c568b897bf278bf2b46f87a00badde12fca331234728133028a71688c48361007656ee4b315633f822a06a
-
Filesize
72KB
MD540315029eb0788fafb4d7e639106e36a
SHA1bed4789e3246fc78f0ffa011f215e30dca87aa6c
SHA256ac6b665b26c9096900087c34b9ba6aa8a52b4153dbe33f7b0c9e2a87e105a43b
SHA51201aa92553444939b3fc6b8dcc18c291636a2fc10a2354bd8c8342f432f2515905ca2d227401c965b2f58f5874e87eb66c7b48d94c9c15573b4f3f90aa3e605cb
-
Filesize
72KB
MD540315029eb0788fafb4d7e639106e36a
SHA1bed4789e3246fc78f0ffa011f215e30dca87aa6c
SHA256ac6b665b26c9096900087c34b9ba6aa8a52b4153dbe33f7b0c9e2a87e105a43b
SHA51201aa92553444939b3fc6b8dcc18c291636a2fc10a2354bd8c8342f432f2515905ca2d227401c965b2f58f5874e87eb66c7b48d94c9c15573b4f3f90aa3e605cb
-
Filesize
72KB
MD5f5caffe7b54d66d324c4db5eadfdf26b
SHA18a1925b02302c6282493f5d501854d7810ab1eb9
SHA256bb50d95e76aee4f3738f4d8fcfd24a2183c2f6f734a86ee8fa607c6d7690524e
SHA512dd5019fbdc286de264e4ace8142845784ccc9962bf9867f96d3002b4b33a88cb6f6fe30c37e02f802f35ba2a2102dbe4ecdb38519f0e032a9dcc294fbe300f70
-
Filesize
72KB
MD5f5caffe7b54d66d324c4db5eadfdf26b
SHA18a1925b02302c6282493f5d501854d7810ab1eb9
SHA256bb50d95e76aee4f3738f4d8fcfd24a2183c2f6f734a86ee8fa607c6d7690524e
SHA512dd5019fbdc286de264e4ace8142845784ccc9962bf9867f96d3002b4b33a88cb6f6fe30c37e02f802f35ba2a2102dbe4ecdb38519f0e032a9dcc294fbe300f70
-
Filesize
72KB
MD59c120611e79980d36648b64177eccf84
SHA1ed934bd253d0abba3c71e1d2b97e22d88d3152bf
SHA256e88941813d383cabedd4eb09058cfbc798e01f408550df188833d30c62753904
SHA512fcc990f043521ff4c01726c541fb491fac04d97a22907e2c0e8376076e11bc5950defef558dd358bccae5ecb8769ca337ff0089b919c9daa1cb71bb3377e720d
-
Filesize
72KB
MD59c120611e79980d36648b64177eccf84
SHA1ed934bd253d0abba3c71e1d2b97e22d88d3152bf
SHA256e88941813d383cabedd4eb09058cfbc798e01f408550df188833d30c62753904
SHA512fcc990f043521ff4c01726c541fb491fac04d97a22907e2c0e8376076e11bc5950defef558dd358bccae5ecb8769ca337ff0089b919c9daa1cb71bb3377e720d
-
Filesize
72KB
MD564e03c1f1c5f60713cb7f82e496ace62
SHA1ba3ca1de68b2e445a4b8fa031364842193974aab
SHA25632bba709115dd65215332b5c90a482ed967cfd282c7904c2e55bd81032084ef9
SHA512de5a89cde76ecb15592a7b3ce9f924c5bc118a81697a86b29f59de59dedfbf90cbf75e9d96bf6d57a8034fe53e9e636ef85a91203ca4b5816e197061d1f77e8f
-
Filesize
72KB
MD564e03c1f1c5f60713cb7f82e496ace62
SHA1ba3ca1de68b2e445a4b8fa031364842193974aab
SHA25632bba709115dd65215332b5c90a482ed967cfd282c7904c2e55bd81032084ef9
SHA512de5a89cde76ecb15592a7b3ce9f924c5bc118a81697a86b29f59de59dedfbf90cbf75e9d96bf6d57a8034fe53e9e636ef85a91203ca4b5816e197061d1f77e8f
-
Filesize
72KB
MD52664b246adea47f726e20f00e952c6e6
SHA167eaea2a82669536f7bf9fc13c532905c23d6bfb
SHA25666c01c72e39a1cd6c730adcfce44eee8926f1bf09a0db20bfccd74d72c68bdc0
SHA512f7fd87d219f0af8812b5573c0c39ad6840c5252c9b3eb60839707604153a20c507e921ef3a19317135c8a454f0bdc0bc4d9190e9125755690d619e719810a198
-
Filesize
72KB
MD52664b246adea47f726e20f00e952c6e6
SHA167eaea2a82669536f7bf9fc13c532905c23d6bfb
SHA25666c01c72e39a1cd6c730adcfce44eee8926f1bf09a0db20bfccd74d72c68bdc0
SHA512f7fd87d219f0af8812b5573c0c39ad6840c5252c9b3eb60839707604153a20c507e921ef3a19317135c8a454f0bdc0bc4d9190e9125755690d619e719810a198
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
Filesize
72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5e8b20561972ab82d7dfcf1e4219ee2ce
SHA1c5e5dca89ab2d71ab36a8c8374f09e92849ea0a2
SHA256edb7372fa3b708db7a94e65c9aee1cde093fd74823a4eb0c2662acf7a9420a1f
SHA512cc6b4c46a43ead1db8588b9238dfd0e2fcd5d94a7d235ef8e4cb999398c1a9eb03d1fe4777a8b0eee6b3ea89613f39e9d7045374fd5ef94228d112d985b15d5a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5422262f7e9371845dcacfc5db0cb2e46
SHA1ae7f3d8876a4343eb136c64480e31d7f8f383f7a
SHA2562ee283f375c613e0458f8255ce8dbfcb8501f2f45861c50756efb141eb8ab7bb
SHA512bfb04dfc46d6aeb83bed174dbf9dbcb4f374551188db66a8ece00927bd0a176862c1b8f86b314a9d9c49fc88ead22cddbd8e37526996b2f6c4f8bff6ffe454f2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5422262f7e9371845dcacfc5db0cb2e46
SHA1ae7f3d8876a4343eb136c64480e31d7f8f383f7a
SHA2562ee283f375c613e0458f8255ce8dbfcb8501f2f45861c50756efb141eb8ab7bb
SHA512bfb04dfc46d6aeb83bed174dbf9dbcb4f374551188db66a8ece00927bd0a176862c1b8f86b314a9d9c49fc88ead22cddbd8e37526996b2f6c4f8bff6ffe454f2
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD5cdd4fdd574f4c80e8b32456c322cae51
SHA17326378bb15c285af8e5f969641a51e7e99dd622
SHA2563ba7e922365cabdecca9a1cb464bd43638ad7bd65981c6e82cdfb159d962d6cc
SHA512da1c87e4e70c14a272e58d593a67ad9433023af985e4d7dbe713272b05ca5e775ca1d79761c7e789dbdfa98269e97e4f6a6a1ee0ee4293f87aa39c5a61e51d08
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98
-
Filesize
72KB
MD586a18e3a60cd48ea2426cd38c01b9019
SHA1be9eb01ab927bf58a1cf703db452b59b73305889
SHA256415aee5b9c010dedea40716fbcd1bae02e2a2ae086ce018729032bef08f0ca95
SHA512a744a8ab9a52fa6943ae828cc9f1b3dcbfc8805f1edec3ab45bb4bf5e509b5aa8fbe63ef671534a379c2901dd9062dfb621bc3aac3bb6f727d1e27e5a4fdbb98