Analysis
-
max time kernel
73s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
12-10-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe
Resource
win10v2004-20220901-en
General
-
Target
b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe
-
Size
72KB
-
MD5
6b4e6a998416fe58a5cbdc5f82d467ce
-
SHA1
1767e7853fcbe2a3ae33b1c4eec9f28443ae5ec5
-
SHA256
b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6
-
SHA512
e5cd02cd975caea70967ffa894f22b00de084d15abe9f32f129702cefc04fc25b0113e135d932ea731548aaa05368b06adfec52c72407b3a5329b5624e7db68c
-
SSDEEP
768:rpQNwC3BEc4QEfu0Ei8XxNDINE3BEJwRr9w:teThavEjDWguK9w
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 268 backup.exe 1300 backup.exe 1988 backup.exe 1468 backup.exe 1516 backup.exe 1744 backup.exe 1964 backup.exe 424 backup.exe 1912 backup.exe 816 backup.exe 1148 backup.exe 332 backup.exe 368 backup.exe 768 update.exe 1272 backup.exe 1344 backup.exe 1700 backup.exe 2024 backup.exe 2040 backup.exe 1300 backup.exe 568 backup.exe 1224 backup.exe 1356 backup.exe 1396 backup.exe 1744 backup.exe 1500 backup.exe 436 backup.exe 1608 backup.exe 1188 backup.exe 1532 backup.exe 1848 backup.exe 1708 update.exe 1132 backup.exe 1348 backup.exe 1668 backup.exe 1136 backup.exe 1836 backup.exe 1776 backup.exe 940 backup.exe 1596 System Restore.exe 1068 backup.exe 1020 backup.exe 2020 backup.exe 1464 backup.exe 1180 backup.exe 1636 backup.exe 1516 backup.exe 1372 backup.exe 1724 backup.exe 2032 backup.exe 988 backup.exe 1620 data.exe 1904 backup.exe 1992 update.exe 1616 backup.exe 2000 backup.exe 1488 backup.exe 368 backup.exe 1660 backup.exe 1512 backup.exe 332 backup.exe 1136 backup.exe 1456 backup.exe 1188 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 1964 backup.exe 1964 backup.exe 1912 backup.exe 1912 backup.exe 1964 backup.exe 1964 backup.exe 1148 backup.exe 1148 backup.exe 332 backup.exe 332 backup.exe 1148 backup.exe 768 update.exe 768 update.exe 768 update.exe 768 update.exe 768 update.exe 1272 backup.exe 1272 backup.exe 1272 backup.exe 1272 backup.exe 1272 backup.exe 1344 backup.exe 1344 backup.exe 1344 backup.exe 1272 backup.exe 1272 backup.exe 1700 backup.exe 1700 backup.exe 1700 backup.exe 1700 backup.exe 1700 backup.exe 2024 backup.exe 2024 backup.exe 2024 backup.exe 1700 backup.exe 1700 backup.exe 2040 backup.exe 2040 backup.exe 2040 backup.exe 1700 backup.exe 1700 backup.exe 1300 backup.exe 1300 backup.exe 1300 backup.exe 1700 backup.exe 1700 backup.exe 568 backup.exe 568 backup.exe 568 backup.exe 1700 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\System Restore.exe update.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe update.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 268 backup.exe 1300 backup.exe 1988 backup.exe 1468 backup.exe 1516 backup.exe 1744 backup.exe 1964 backup.exe 424 backup.exe 1912 backup.exe 816 backup.exe 1148 backup.exe 332 backup.exe 368 backup.exe 768 update.exe 1272 backup.exe 1344 backup.exe 1700 backup.exe 2024 backup.exe 2040 backup.exe 1300 backup.exe 568 backup.exe 1224 backup.exe 1356 backup.exe 1396 backup.exe 1744 backup.exe 1500 backup.exe 436 backup.exe 1608 backup.exe 1188 backup.exe 1532 backup.exe 1848 backup.exe 1708 update.exe 1132 backup.exe 1348 backup.exe 1668 backup.exe 1136 backup.exe 1836 backup.exe 1776 backup.exe 940 backup.exe 1596 System Restore.exe 1068 backup.exe 1020 backup.exe 2020 backup.exe 1464 backup.exe 1180 backup.exe 1636 backup.exe 1516 backup.exe 1372 backup.exe 1724 backup.exe 2032 backup.exe 988 backup.exe 1620 data.exe 1904 backup.exe 1992 update.exe 1616 backup.exe 2000 backup.exe 1488 backup.exe 1660 backup.exe 1512 backup.exe 332 backup.exe 1136 backup.exe 1456 backup.exe 1588 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1100 wrote to memory of 268 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 27 PID 1100 wrote to memory of 268 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 27 PID 1100 wrote to memory of 268 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 27 PID 1100 wrote to memory of 268 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 27 PID 1100 wrote to memory of 1300 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 28 PID 1100 wrote to memory of 1300 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 28 PID 1100 wrote to memory of 1300 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 28 PID 1100 wrote to memory of 1300 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 28 PID 1100 wrote to memory of 1988 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 29 PID 1100 wrote to memory of 1988 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 29 PID 1100 wrote to memory of 1988 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 29 PID 1100 wrote to memory of 1988 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 29 PID 1100 wrote to memory of 1468 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 30 PID 1100 wrote to memory of 1468 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 30 PID 1100 wrote to memory of 1468 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 30 PID 1100 wrote to memory of 1468 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 30 PID 1100 wrote to memory of 1516 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 31 PID 1100 wrote to memory of 1516 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 31 PID 1100 wrote to memory of 1516 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 31 PID 1100 wrote to memory of 1516 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 31 PID 1100 wrote to memory of 1744 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 32 PID 1100 wrote to memory of 1744 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 32 PID 1100 wrote to memory of 1744 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 32 PID 1100 wrote to memory of 1744 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 32 PID 268 wrote to memory of 1964 268 backup.exe 33 PID 268 wrote to memory of 1964 268 backup.exe 33 PID 268 wrote to memory of 1964 268 backup.exe 33 PID 268 wrote to memory of 1964 268 backup.exe 33 PID 1100 wrote to memory of 424 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 34 PID 1100 wrote to memory of 424 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 34 PID 1100 wrote to memory of 424 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 34 PID 1100 wrote to memory of 424 1100 b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe 34 PID 1964 wrote to memory of 1912 1964 backup.exe 35 PID 1964 wrote to memory of 1912 1964 backup.exe 35 PID 1964 wrote to memory of 1912 1964 backup.exe 35 PID 1964 wrote to memory of 1912 1964 backup.exe 35 PID 1912 wrote to memory of 816 1912 backup.exe 36 PID 1912 wrote to memory of 816 1912 backup.exe 36 PID 1912 wrote to memory of 816 1912 backup.exe 36 PID 1912 wrote to memory of 816 1912 backup.exe 36 PID 1964 wrote to memory of 1148 1964 backup.exe 37 PID 1964 wrote to memory of 1148 1964 backup.exe 37 PID 1964 wrote to memory of 1148 1964 backup.exe 37 PID 1964 wrote to memory of 1148 1964 backup.exe 37 PID 1148 wrote to memory of 332 1148 backup.exe 38 PID 1148 wrote to memory of 332 1148 backup.exe 38 PID 1148 wrote to memory of 332 1148 backup.exe 38 PID 1148 wrote to memory of 332 1148 backup.exe 38 PID 332 wrote to memory of 368 332 backup.exe 39 PID 332 wrote to memory of 368 332 backup.exe 39 PID 332 wrote to memory of 368 332 backup.exe 39 PID 332 wrote to memory of 368 332 backup.exe 39 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 1148 wrote to memory of 768 1148 backup.exe 40 PID 768 wrote to memory of 1272 768 update.exe 41 PID 768 wrote to memory of 1272 768 update.exe 41 PID 768 wrote to memory of 1272 768 update.exe 41 PID 768 wrote to memory of 1272 768 update.exe 41 PID 768 wrote to memory of 1272 768 update.exe 41 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe"C:\Users\Admin\AppData\Local\Temp\b0af741a6ff747f5d6f07202c9a68d399f001063a761a385d57ac54a35e0bef6.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\600534166\backup.exeC:\Users\Admin\AppData\Local\Temp\600534166\backup.exe C:\Users\Admin\AppData\Local\Temp\600534166\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:268 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1912 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:816
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:332 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:368
-
-
-
C:\Program Files\Common Files\update.exe"C:\Program Files\Common Files\update.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1272 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1344
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1300
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1224
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1396
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1776
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:940
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1464
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Executes dropped EXE
PID:368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵PID:700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵PID:1528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵PID:2008
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵PID:948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵PID:1180
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\8⤵PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\8⤵PID:1092
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1456 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:796
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:820
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:824
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1580
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1888
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- System policy modification
PID:1840 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:844
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:1388
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1224
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1848
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1972
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1164
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:328
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2100
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1776 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2020
-
-
-
C:\Program Files\Common Files\System\System Restore.exe"C:\Program Files\Common Files\System\System Restore.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1752 -
C:\Program Files\Common Files\System\ado\System Restore.exe"C:\Program Files\Common Files\System\ado\System Restore.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1672
-
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵PID:1600
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1964
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:2124
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:524
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1640
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1724
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:860
-
-
C:\Program Files\Common Files\System\it-IT\data.exe"C:\Program Files\Common Files\System\it-IT\data.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:1844
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1560
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2052
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:2140
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1188
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
PID:1972
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1152
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:1568
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:832
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1784
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:240
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1176 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:680
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1040
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:900
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1824
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1012
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:2076
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:2172
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1472
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1064
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1036
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:820
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:2064
-
-
C:\Program Files\VideoLAN\backup.exe"C:\Program Files\VideoLAN\backup.exe" C:\Program Files\VideoLAN\5⤵PID:2160
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:332
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2008
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1756
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
PID:588
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1876 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵PID:1620
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1708
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1592
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:588
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵
- System policy modification
PID:1580
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:936
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1864
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:796
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1904
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1136
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2032 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1132 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:632
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:1996
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1756
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:760
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:616
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:332
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:972
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:1636
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:1212
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1676
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1548
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:652
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:964
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:2132
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:424
-
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1608
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:1360
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD5b461e9d33fc99f4dd58b3c2b1c0cafbc
SHA1bae22a182b45f7887a5506a8ec051038c163d23d
SHA256dafe989f5f68e0e8476ee9f5575ec4259ed78a391ee03ea82be665c31cf54a9a
SHA5126bed6aa18700a742bcde6c27c3f7d09774c436b593aa439f52e3295f0f21889ddd569cc14a978e24fb23d9364c494473007751d29b9f957240b4bedf0a11c77e
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD580bdf12fbf60d815816318e3613f6753
SHA14f52bac7b47c1e74e8c41017d442c95308d60b3a
SHA256d387b720cb18f379c26989639624b375ebc866dfe4fb57bd8a7e1b32bbb74cd8
SHA5129843c9e282704791b817a2ea2858c5bbaf09e1ce5cba249f520b152661170d152956fc2b880ee68d96a8fdba11956332966953bf0799429cb47c7ab2a8cfbfac
-
Filesize
72KB
MD580bdf12fbf60d815816318e3613f6753
SHA14f52bac7b47c1e74e8c41017d442c95308d60b3a
SHA256d387b720cb18f379c26989639624b375ebc866dfe4fb57bd8a7e1b32bbb74cd8
SHA5129843c9e282704791b817a2ea2858c5bbaf09e1ce5cba249f520b152661170d152956fc2b880ee68d96a8fdba11956332966953bf0799429cb47c7ab2a8cfbfac
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD5b461e9d33fc99f4dd58b3c2b1c0cafbc
SHA1bae22a182b45f7887a5506a8ec051038c163d23d
SHA256dafe989f5f68e0e8476ee9f5575ec4259ed78a391ee03ea82be665c31cf54a9a
SHA5126bed6aa18700a742bcde6c27c3f7d09774c436b593aa439f52e3295f0f21889ddd569cc14a978e24fb23d9364c494473007751d29b9f957240b4bedf0a11c77e
-
Filesize
72KB
MD5b461e9d33fc99f4dd58b3c2b1c0cafbc
SHA1bae22a182b45f7887a5506a8ec051038c163d23d
SHA256dafe989f5f68e0e8476ee9f5575ec4259ed78a391ee03ea82be665c31cf54a9a
SHA5126bed6aa18700a742bcde6c27c3f7d09774c436b593aa439f52e3295f0f21889ddd569cc14a978e24fb23d9364c494473007751d29b9f957240b4bedf0a11c77e
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD5cba27bca4cbc672aa8977c48dc9afbf0
SHA1ee1e04dca21ae2848a7be9b2ef1e2e29c49a36a9
SHA25606710a934f99d308d3f36ffa40da3de07dcc30a44ab5db633aaf80c5f3dd918f
SHA512a5e6e6f3254f4fc107a0bd6836fcaf620544db33e2cb5bfa459b5c5c7c8403ae90b6294b507bd1a4c025753c8a91bb682ba08e7e4a27623c5f670cb611345745
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5291ba8a529e131f8792985203f421573
SHA19b69219a92d22aeca2ae4b856f2cf01649cc9980
SHA2566bd5c7fb8e0c52511a9ec11e6f572bac4d1fbb1a691737687ee4fbcad25715ae
SHA512ac31195f8fb0998e70fa17331636c993e60ef48b4886f0a4b09a88eb3d406c0ba62e22a9b6a8bbec91c1a5720933231a4abd2c25ea4be673c0dac09c3b8cbb8c
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5971ef7c624fdb83ddd5d37d752eccead
SHA1debd7a4a2f73af7de08ebf6472840920c885399a
SHA256b6bfb9220dc8e3420cf631dd9bb261f861968ac7a7ec4777b6f6a1ce8cb9968d
SHA512b66fcc4214c18f30acc9f6bff8fc803dadb9b65a17f3bbc02c4daa60e257308f1d53fed6d711cc2c2b6a660c74a50bac7ac553adf5af45f6ac8dffcb8212bf2e
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD5f213e0e30d8d5acb0832aa770aba7682
SHA1484373d557d062f093f78646f2ca39bd129dad51
SHA256cf06474dca427c03c1586d1c2649e20042b1aee925d5031d617785aae62af385
SHA51266a2a3ae68ab1ff91278aaa880cb56a5594033282f51680f97e910b74392b8605f620379b4b95674c1924ff737dd839d63fee2e026dfb9a8594d34b5b979f658
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD56a1c75c84e25073aa9d2faf947b9aecb
SHA146f8942c1fe15de1959b8e4d6105d77d4586b50b
SHA256fa75d9100cb25afbd9aacf0174bf3b70cf7663695e8dea67b9b12da158bdfc56
SHA512094e0bc5e4a3f242324d59482b3c599568a4946bdd329175f26aacafc91e42c893bdbf79259e93e0d1518fcb4b241279d0b6b4f8d4231d9a9ef080f2da9d5f5f
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD592a4f92339a7fa197c62437d637f1f1c
SHA1aeb36a0226bb32942a3cc93288ee3f010ca92a82
SHA2563ab6875debcd5698c2cb35513cc5fe82142d116afea2b60a517df515c123344a
SHA5124b6a2cdad2f8ade6f9b48305f8f686994ff684eb04f70643bfcd41ecef2945d4445c9f1f11f4437a9b9c45cec2060b25cc33a79d06ccd1d21143df875e74f313
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2
-
Filesize
72KB
MD5c20bcf27a0e9aed8c77ae057f8f1d01f
SHA1dc44aa78563f83fb697c93bc3421fe2267c2f0bd
SHA256c8504df056e0be5e716f7b9f466c5399cd12c4de7700d12641b9ffc905c5271e
SHA5129be56f997b2bfe25ec4c99bdf499f60baa11c509a29b61f06803da36a88b3fe614ad4d062119d9c28f8567d4d74153bc1ef3c97fdc59afc5f89f8e16860561b2