Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06-11-2022 12:33
Static task
static1
Behavioral task
behavioral1
Sample
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
Resource
win10v2004-20220812-en
General
-
Target
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe
-
Size
72KB
-
MD5
0d69e0205cf8278837603e7bd028d3cd
-
SHA1
4d1c60e42606659da64fff675ab0df2fab6af89d
-
SHA256
77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af
-
SHA512
fcc9c4e1019a2ff9e1a2c2faa61f12c2c50b77293ef954eead566968295c2052993842ff590a6cae7b45be3d796659fea3bea1d724394295fc6f2b7b6a405b10
-
SSDEEP
768:rpQNwC3BEc4QEfu0Ei8XxNDINE3BEJwRr3k70F:teThavEjDWguKUy
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1696 backup.exe 1616 backup.exe 1212 data.exe 1136 backup.exe 1940 backup.exe 368 backup.exe 904 backup.exe 1700 backup.exe 1836 backup.exe 1208 backup.exe 1848 backup.exe 744 System Restore.exe 1984 backup.exe 1476 backup.exe 1728 System Restore.exe 1660 backup.exe 1388 backup.exe 740 backup.exe 1508 backup.exe 1760 backup.exe 836 backup.exe 1392 backup.exe 772 System Restore.exe 896 backup.exe 1540 backup.exe 368 backup.exe 600 backup.exe 1624 backup.exe 684 backup.exe 872 backup.exe 804 backup.exe 1168 backup.exe 1580 backup.exe 456 backup.exe 1992 backup.exe 1120 backup.exe 992 backup.exe 1516 backup.exe 1272 backup.exe 1056 backup.exe 620 backup.exe 1068 backup.exe 596 backup.exe 1372 backup.exe 1568 backup.exe 960 backup.exe 1420 backup.exe 1292 backup.exe 1284 backup.exe 1408 backup.exe 784 backup.exe 828 backup.exe 1940 backup.exe 688 backup.exe 624 backup.exe 1628 backup.exe 1588 backup.exe 1880 backup.exe 1180 backup.exe 1624 backup.exe 1840 backup.exe 1380 backup.exe 1384 backup.exe 1332 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 1700 backup.exe 1700 backup.exe 1836 backup.exe 1836 backup.exe 1700 backup.exe 1700 backup.exe 1848 backup.exe 1848 backup.exe 744 System Restore.exe 744 System Restore.exe 1848 backup.exe 1848 backup.exe 1476 backup.exe 1476 backup.exe 1728 System Restore.exe 1728 System Restore.exe 1728 System Restore.exe 1728 System Restore.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1388 backup.exe 1848 backup.exe 1700 backup.exe 1848 backup.exe 1700 backup.exe 1728 System Restore.exe 1728 System Restore.exe 1476 backup.exe 1388 backup.exe 1476 backup.exe 1388 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe System Restore.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\System Restore.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe backup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 1696 backup.exe 1616 backup.exe 1212 data.exe 1136 backup.exe 1940 backup.exe 368 backup.exe 904 backup.exe 1700 backup.exe 1836 backup.exe 1208 backup.exe 1848 backup.exe 744 System Restore.exe 1984 backup.exe 1476 backup.exe 1728 System Restore.exe 1660 backup.exe 1388 backup.exe 740 backup.exe 1508 backup.exe 1760 backup.exe 836 backup.exe 1392 backup.exe 772 System Restore.exe 896 backup.exe 1540 backup.exe 368 backup.exe 600 backup.exe 1624 backup.exe 684 backup.exe 872 backup.exe 804 backup.exe 1168 backup.exe 1580 backup.exe 456 backup.exe 1120 backup.exe 1516 backup.exe 1992 backup.exe 992 backup.exe 1272 backup.exe 1068 backup.exe 1372 backup.exe 1056 backup.exe 596 backup.exe 620 backup.exe 1420 backup.exe 960 backup.exe 1284 backup.exe 1292 backup.exe 1408 backup.exe 784 backup.exe 828 backup.exe 1940 backup.exe 688 backup.exe 624 backup.exe 1588 backup.exe 1628 backup.exe 1880 backup.exe 1180 backup.exe 1624 backup.exe 1840 backup.exe 1384 backup.exe 1380 backup.exe 1332 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 548 wrote to memory of 1696 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 27 PID 548 wrote to memory of 1696 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 27 PID 548 wrote to memory of 1696 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 27 PID 548 wrote to memory of 1696 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 27 PID 548 wrote to memory of 1616 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 28 PID 548 wrote to memory of 1616 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 28 PID 548 wrote to memory of 1616 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 28 PID 548 wrote to memory of 1616 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 28 PID 548 wrote to memory of 1212 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 29 PID 548 wrote to memory of 1212 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 29 PID 548 wrote to memory of 1212 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 29 PID 548 wrote to memory of 1212 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 29 PID 548 wrote to memory of 1136 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 30 PID 548 wrote to memory of 1136 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 30 PID 548 wrote to memory of 1136 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 30 PID 548 wrote to memory of 1136 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 30 PID 548 wrote to memory of 1940 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 31 PID 548 wrote to memory of 1940 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 31 PID 548 wrote to memory of 1940 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 31 PID 548 wrote to memory of 1940 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 31 PID 548 wrote to memory of 368 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 32 PID 548 wrote to memory of 368 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 32 PID 548 wrote to memory of 368 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 32 PID 548 wrote to memory of 368 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 32 PID 548 wrote to memory of 904 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 33 PID 548 wrote to memory of 904 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 33 PID 548 wrote to memory of 904 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 33 PID 548 wrote to memory of 904 548 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe 33 PID 1696 wrote to memory of 1700 1696 backup.exe 34 PID 1696 wrote to memory of 1700 1696 backup.exe 34 PID 1696 wrote to memory of 1700 1696 backup.exe 34 PID 1696 wrote to memory of 1700 1696 backup.exe 34 PID 1700 wrote to memory of 1836 1700 backup.exe 35 PID 1700 wrote to memory of 1836 1700 backup.exe 35 PID 1700 wrote to memory of 1836 1700 backup.exe 35 PID 1700 wrote to memory of 1836 1700 backup.exe 35 PID 1836 wrote to memory of 1208 1836 backup.exe 36 PID 1836 wrote to memory of 1208 1836 backup.exe 36 PID 1836 wrote to memory of 1208 1836 backup.exe 36 PID 1836 wrote to memory of 1208 1836 backup.exe 36 PID 1700 wrote to memory of 1848 1700 backup.exe 37 PID 1700 wrote to memory of 1848 1700 backup.exe 37 PID 1700 wrote to memory of 1848 1700 backup.exe 37 PID 1700 wrote to memory of 1848 1700 backup.exe 37 PID 1848 wrote to memory of 744 1848 backup.exe 38 PID 1848 wrote to memory of 744 1848 backup.exe 38 PID 1848 wrote to memory of 744 1848 backup.exe 38 PID 1848 wrote to memory of 744 1848 backup.exe 38 PID 744 wrote to memory of 1984 744 System Restore.exe 39 PID 744 wrote to memory of 1984 744 System Restore.exe 39 PID 744 wrote to memory of 1984 744 System Restore.exe 39 PID 744 wrote to memory of 1984 744 System Restore.exe 39 PID 1848 wrote to memory of 1476 1848 backup.exe 40 PID 1848 wrote to memory of 1476 1848 backup.exe 40 PID 1848 wrote to memory of 1476 1848 backup.exe 40 PID 1848 wrote to memory of 1476 1848 backup.exe 40 PID 1476 wrote to memory of 1728 1476 backup.exe 41 PID 1476 wrote to memory of 1728 1476 backup.exe 41 PID 1476 wrote to memory of 1728 1476 backup.exe 41 PID 1476 wrote to memory of 1728 1476 backup.exe 41 PID 1728 wrote to memory of 1660 1728 System Restore.exe 42 PID 1728 wrote to memory of 1660 1728 System Restore.exe 42 PID 1728 wrote to memory of 1660 1728 System Restore.exe 42 PID 1728 wrote to memory of 1660 1728 System Restore.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe"C:\Users\Admin\AppData\Local\Temp\77620f7ac68299f4570aa4397a001307b1c572e5a5a2881aea89bae58f5602af.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:548 -
C:\Users\Admin\AppData\Local\Temp\1446290573\backup.exeC:\Users\Admin\AppData\Local\Temp\1446290573\backup.exe C:\Users\Admin\AppData\Local\Temp\1446290573\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1696 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1700 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1836 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files\7-Zip\System Restore.exe"C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:744 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1984
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1476 -
C:\Program Files\Common Files\Microsoft Shared\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1728 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1392
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:772
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1580 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1516
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- System policy modification
PID:1524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
PID:1872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:1064
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1704
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1984
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:804 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:596
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1628
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1840 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1120
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1992
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:688
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1384
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1168
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1372
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380
-
-
C:\Program Files\Common Files\System\ado\fr-FR\data.exe"C:\Program Files\Common Files\System\ado\fr-FR\data.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1960
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1140
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:1508
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1720
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:968
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:992
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1068
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
PID:1568
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1940
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:956
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1296 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:772 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1712
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:1996
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1624
-
-
C:\Program Files\Microsoft Games\System Restore.exe"C:\Program Files\Microsoft Games\System Restore.exe" C:\Program Files\Microsoft Games\5⤵PID:1372
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:456 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:688
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1016 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
PID:1516
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:1760
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:1656 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:1836
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:1588
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1844
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1764
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1872
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:612 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- System policy modification
PID:932
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1936 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:620
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Drops file in Windows directory
PID:1004 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1640
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\Low\data.exeC:\Users\Admin\AppData\Local\Temp\Low\data.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1136
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5c7dc8ac21bebc983b7416e1599a5c4f2
SHA1453fd94db8c5d3a0281fc4d0cc94244cc9b5062c
SHA256e065d56986add7bdc1afa96478cd872d79b3d2d8d208eca1299f715542d404d8
SHA512bb81d3fb69ff0548c9bb368b25eec68e12f01cfd2be3ade59ae09abc7cab4e521d9d95c62ef5a9c3af45f8d56306ed3be96baea267ed8a937920a31e4992f437
-
Filesize
72KB
MD5c3f04bbaa52c7d28b03602a651bb421b
SHA1111905ae4a6d99a4694029d98eb982554e2b7cbc
SHA256195ba17a164b3c0f2fbdbea09876d5e8d6510b6942b868aef4fc51229a11fe2d
SHA512d36e8f6bff7f889aee6445dcb2912c4991f2890702f3b794161904e92b96c2fc23fb9fc0be67209dd671813119f3ad9649a83a37406b447b2c4c473fe694493f
-
Filesize
72KB
MD5c3f04bbaa52c7d28b03602a651bb421b
SHA1111905ae4a6d99a4694029d98eb982554e2b7cbc
SHA256195ba17a164b3c0f2fbdbea09876d5e8d6510b6942b868aef4fc51229a11fe2d
SHA512d36e8f6bff7f889aee6445dcb2912c4991f2890702f3b794161904e92b96c2fc23fb9fc0be67209dd671813119f3ad9649a83a37406b447b2c4c473fe694493f
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5ea38e43014690214c721210175e827b4
SHA181207a8687fe5f1cb57ac8d6780950c490c099ff
SHA256dcb3721c8e5276a9bbd2a4d0204ac3cb02bf9cd9a02e3c3d570958faadc631e4
SHA512a12144f5d9ce6c3f7ba87314cf541e8802c99e7d224bc1104700ab93eb8e954058e65c856a5dd07e9a8d6b2d0c139fb3441e9759eecdc091605d0745fd6d7a18
-
Filesize
72KB
MD5ea38e43014690214c721210175e827b4
SHA181207a8687fe5f1cb57ac8d6780950c490c099ff
SHA256dcb3721c8e5276a9bbd2a4d0204ac3cb02bf9cd9a02e3c3d570958faadc631e4
SHA512a12144f5d9ce6c3f7ba87314cf541e8802c99e7d224bc1104700ab93eb8e954058e65c856a5dd07e9a8d6b2d0c139fb3441e9759eecdc091605d0745fd6d7a18
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD54303c8112009db4211849ae9bccdb131
SHA129a5aee8ad52c38fccd8e4d421af5d5f519d0478
SHA256e025cba91add73e5f88692c611c6ca921391edad78ebb2aa4df9383326732654
SHA512759194268b0e58e1b2a14144b42485f61db557fab29d86507b707ad0a093e2ac845074a6753b67d57faca472855d89181c984b1a353fcd3a36fdbc979875686c
-
Filesize
72KB
MD54303c8112009db4211849ae9bccdb131
SHA129a5aee8ad52c38fccd8e4d421af5d5f519d0478
SHA256e025cba91add73e5f88692c611c6ca921391edad78ebb2aa4df9383326732654
SHA512759194268b0e58e1b2a14144b42485f61db557fab29d86507b707ad0a093e2ac845074a6753b67d57faca472855d89181c984b1a353fcd3a36fdbc979875686c
-
Filesize
72KB
MD5c7dc8ac21bebc983b7416e1599a5c4f2
SHA1453fd94db8c5d3a0281fc4d0cc94244cc9b5062c
SHA256e065d56986add7bdc1afa96478cd872d79b3d2d8d208eca1299f715542d404d8
SHA512bb81d3fb69ff0548c9bb368b25eec68e12f01cfd2be3ade59ae09abc7cab4e521d9d95c62ef5a9c3af45f8d56306ed3be96baea267ed8a937920a31e4992f437
-
Filesize
72KB
MD5c7dc8ac21bebc983b7416e1599a5c4f2
SHA1453fd94db8c5d3a0281fc4d0cc94244cc9b5062c
SHA256e065d56986add7bdc1afa96478cd872d79b3d2d8d208eca1299f715542d404d8
SHA512bb81d3fb69ff0548c9bb368b25eec68e12f01cfd2be3ade59ae09abc7cab4e521d9d95c62ef5a9c3af45f8d56306ed3be96baea267ed8a937920a31e4992f437
-
Filesize
72KB
MD5c3f04bbaa52c7d28b03602a651bb421b
SHA1111905ae4a6d99a4694029d98eb982554e2b7cbc
SHA256195ba17a164b3c0f2fbdbea09876d5e8d6510b6942b868aef4fc51229a11fe2d
SHA512d36e8f6bff7f889aee6445dcb2912c4991f2890702f3b794161904e92b96c2fc23fb9fc0be67209dd671813119f3ad9649a83a37406b447b2c4c473fe694493f
-
Filesize
72KB
MD5c3f04bbaa52c7d28b03602a651bb421b
SHA1111905ae4a6d99a4694029d98eb982554e2b7cbc
SHA256195ba17a164b3c0f2fbdbea09876d5e8d6510b6942b868aef4fc51229a11fe2d
SHA512d36e8f6bff7f889aee6445dcb2912c4991f2890702f3b794161904e92b96c2fc23fb9fc0be67209dd671813119f3ad9649a83a37406b447b2c4c473fe694493f
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5d61af02f57a66837516539b81bde7f4d
SHA16dd6296b8dd74a0e8f54ee4aa4dc545ccd28747b
SHA25609470eea09e3e289b8e25a7471bf78670bb9bc5de290c873742c0b301151727b
SHA512b1ed7e586c4e2780556c3486d10e26d939893dafc4663fba1821b9ce1c56077a25918ff7ed855932372fb1b95331a9f607120aa0fa5ee801d3d0fc552616af9a
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD570ba49e485bfabba3291fa5f11b8ee7a
SHA19e87511c7519b572dca7bfa28d5e07a473c55f1c
SHA2566d21ee7ed3fc8a545316fcb14f317d0638291a373253870664f2bf1ee82c4bca
SHA5123725ebaddf79538db499cd99358291d63d95b52d5c362819239bbc99382f2a1d96f2c522917cd8121141f5490ca97843821a5cf3190be1d4f63288a03931ac21
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD5a3a92ab75b93b79f20b7ef544558b816
SHA1a9c2cadd26c09cbac4dd648c216684e6f138db78
SHA2566abd29b146249e2e1cffbad2e1110404bf9118b392fff3d4660424d74e4f4b06
SHA5122da5545ad125d68fa225b000170d593f5c63f77be61d1eb1ccb9b13d7c0a88bb91384440b1fe291df3b023d2f0025f2d1a6f7c28c001a9e60e2dd4878d5b252f
-
Filesize
72KB
MD5f4230248ee89eeee5827200f92df91c1
SHA1a5710c02dff4f866328900656a18f587f126e9e1
SHA25662f040056f5eefdb178a9e9fc84b6f68b6cfdf05488e46f4539c12f3b0baa25f
SHA512b676360127dedd17abbd80920bdce7cb216b5e1738763969694584bac0e50f5b56da3f0325eb4a9377fee2714487ddd3c9321198584ff05afa20771ca776272a
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5c83edc0e7da9d195497a45e0e7bca242
SHA10b9c797d3a4b391fd865568426b9ccb6ed7559a6
SHA256ad0f4d7797df464be7f42fc9c3982ddc21b46685397d3443eb91cb0e8cd83977
SHA5122ca181f8b55d32f11c8d4ecf7ebb3c8403236e8fa5f16e342d64f5958a62ace66a70458dd40221af1dc22fd9d504a0e99d1596b904c1ce11e8face586d02cfa2
-
Filesize
72KB
MD5ea38e43014690214c721210175e827b4
SHA181207a8687fe5f1cb57ac8d6780950c490c099ff
SHA256dcb3721c8e5276a9bbd2a4d0204ac3cb02bf9cd9a02e3c3d570958faadc631e4
SHA512a12144f5d9ce6c3f7ba87314cf541e8802c99e7d224bc1104700ab93eb8e954058e65c856a5dd07e9a8d6b2d0c139fb3441e9759eecdc091605d0745fd6d7a18
-
Filesize
72KB
MD5ea38e43014690214c721210175e827b4
SHA181207a8687fe5f1cb57ac8d6780950c490c099ff
SHA256dcb3721c8e5276a9bbd2a4d0204ac3cb02bf9cd9a02e3c3d570958faadc631e4
SHA512a12144f5d9ce6c3f7ba87314cf541e8802c99e7d224bc1104700ab93eb8e954058e65c856a5dd07e9a8d6b2d0c139fb3441e9759eecdc091605d0745fd6d7a18
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25
-
Filesize
72KB
MD5b2a5bae5d71606101f60285faa2f3e74
SHA181809ed7f365ea91d0b9ca6e7b3af9217d21235c
SHA256c21f959f47e03dec18acd8915380a1987a655f13a9a5e33ccce66f9c8f421b6c
SHA512d5ab3a1be81e0ba990a87edc1ef5cb32ebc559ce1dc9f0307113b9746380e3b6439e8d8d97402dc3acae8eacb5044d081c5e1dce93bbe9afdc2023dc2c4f0c25