Analysis
-
max time kernel
160s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2022 17:30
Static task
static1
Behavioral task
behavioral1
Sample
20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe
Resource
win10v2004-20220812-en
General
-
Target
20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe
-
Size
72KB
-
MD5
0d4b6365fc3e16318df9a711f51a0e9e
-
SHA1
f3bd1f90f2fceef697658f624c4a8213cd4ba2d2
-
SHA256
20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd
-
SHA512
0906a786e4ead16ca9e3d87be6a8684b64729a0e6d1c6d631f2808ece351bd708c1b9040ae1cb94eaf9872ccb92a9ad9330a7b6c3b8ac9e7573dd2e58bfe213b
-
SSDEEP
768:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrTd3FAyvg:HeT7BVwxfvqguKRFAl
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1732 backup.exe 3604 backup.exe 1528 backup.exe 1444 backup.exe 4904 data.exe 3568 backup.exe 4660 backup.exe 2324 backup.exe 5016 System Restore.exe 4576 backup.exe 228 backup.exe 1416 update.exe 3680 backup.exe 4608 backup.exe 2280 backup.exe 4548 backup.exe 4628 backup.exe 1004 backup.exe 4740 backup.exe 2952 backup.exe 4692 backup.exe 3788 backup.exe 3876 backup.exe 2224 backup.exe 5100 backup.exe 1248 backup.exe 4292 backup.exe 2788 update.exe 1728 backup.exe 4976 backup.exe 1612 backup.exe 4880 backup.exe 912 backup.exe 1508 backup.exe 1512 System Restore.exe 1424 backup.exe 3388 System Restore.exe 4448 backup.exe 2684 backup.exe 3784 backup.exe 4224 data.exe 2620 backup.exe 2076 data.exe 4676 backup.exe 3468 backup.exe 4160 backup.exe 1540 backup.exe 4244 backup.exe 3424 data.exe 4240 backup.exe 1672 backup.exe 556 backup.exe 1316 backup.exe 1372 backup.exe 1456 backup.exe 1352 backup.exe 1144 data.exe 1440 update.exe 1996 data.exe 4140 update.exe 3192 backup.exe 5096 backup.exe 3080 backup.exe 3936 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Google\Temp\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe update.exe File opened for modification C:\Program Files\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\defaults\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe update.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\update.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\data.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\update.exe data.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\Updates\backup.exe data.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\backup.exe data.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\update.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe data.exe File opened for modification C:\Program Files (x86)\Common Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\fre\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office\root\backup.exe data.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\features\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe backup.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\Telemetry\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\apppatch\CustomSDB\backup.exe backup.exe File opened for modification C:\Windows\AppReadiness\backup.exe backup.exe File opened for modification C:\Windows\apppatch\backup.exe backup.exe File opened for modification C:\Windows\apppatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\apppatch\Custom\Custom64\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\appcompat\data.exe backup.exe File opened for modification C:\Windows\appcompat\appraiser\backup.exe data.exe File opened for modification C:\Windows\appcompat\encapsulation\backup.exe data.exe File opened for modification C:\Windows\appcompat\Programs\System Restore.exe data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 1732 backup.exe 3604 backup.exe 1528 backup.exe 1444 backup.exe 3568 backup.exe 4904 data.exe 4660 backup.exe 2324 backup.exe 5016 System Restore.exe 4576 backup.exe 228 backup.exe 1416 update.exe 3680 backup.exe 4608 backup.exe 2280 backup.exe 4548 backup.exe 4628 backup.exe 1004 backup.exe 4740 backup.exe 3788 backup.exe 4692 backup.exe 3876 backup.exe 2952 backup.exe 2224 backup.exe 5100 backup.exe 4292 backup.exe 2788 update.exe 1248 backup.exe 1728 backup.exe 1424 backup.exe 4976 backup.exe 1512 System Restore.exe 1612 backup.exe 3388 System Restore.exe 1508 backup.exe 4880 backup.exe 912 backup.exe 4448 backup.exe 2684 backup.exe 3784 backup.exe 4224 data.exe 4676 backup.exe 2076 data.exe 2620 backup.exe 3468 backup.exe 1540 backup.exe 4160 backup.exe 3424 data.exe 4240 backup.exe 556 backup.exe 1672 backup.exe 1352 backup.exe 1456 backup.exe 1144 data.exe 1372 backup.exe 1316 backup.exe 1440 update.exe 4140 update.exe 1996 data.exe 3192 backup.exe 5096 backup.exe 3080 backup.exe 4892 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4512 wrote to memory of 1732 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 80 PID 4512 wrote to memory of 1732 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 80 PID 4512 wrote to memory of 1732 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 80 PID 4512 wrote to memory of 3604 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 81 PID 4512 wrote to memory of 3604 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 81 PID 4512 wrote to memory of 3604 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 81 PID 4512 wrote to memory of 1528 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 82 PID 4512 wrote to memory of 1528 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 82 PID 4512 wrote to memory of 1528 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 82 PID 4512 wrote to memory of 1444 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 83 PID 4512 wrote to memory of 1444 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 83 PID 4512 wrote to memory of 1444 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 83 PID 4512 wrote to memory of 4904 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 84 PID 4512 wrote to memory of 4904 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 84 PID 4512 wrote to memory of 4904 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 84 PID 1732 wrote to memory of 3568 1732 backup.exe 85 PID 1732 wrote to memory of 3568 1732 backup.exe 85 PID 1732 wrote to memory of 3568 1732 backup.exe 85 PID 3568 wrote to memory of 4660 3568 backup.exe 86 PID 3568 wrote to memory of 4660 3568 backup.exe 86 PID 3568 wrote to memory of 4660 3568 backup.exe 86 PID 4512 wrote to memory of 2324 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 87 PID 4512 wrote to memory of 2324 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 87 PID 4512 wrote to memory of 2324 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 87 PID 4512 wrote to memory of 5016 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 88 PID 4512 wrote to memory of 5016 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 88 PID 4512 wrote to memory of 5016 4512 20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe 88 PID 3568 wrote to memory of 4576 3568 backup.exe 89 PID 3568 wrote to memory of 4576 3568 backup.exe 89 PID 3568 wrote to memory of 4576 3568 backup.exe 89 PID 3568 wrote to memory of 228 3568 backup.exe 90 PID 3568 wrote to memory of 228 3568 backup.exe 90 PID 3568 wrote to memory of 228 3568 backup.exe 90 PID 228 wrote to memory of 1416 228 backup.exe 91 PID 228 wrote to memory of 1416 228 backup.exe 91 PID 228 wrote to memory of 1416 228 backup.exe 91 PID 1416 wrote to memory of 3680 1416 update.exe 92 PID 1416 wrote to memory of 3680 1416 update.exe 92 PID 1416 wrote to memory of 3680 1416 update.exe 92 PID 228 wrote to memory of 4608 228 backup.exe 93 PID 228 wrote to memory of 4608 228 backup.exe 93 PID 228 wrote to memory of 4608 228 backup.exe 93 PID 4608 wrote to memory of 2280 4608 backup.exe 94 PID 4608 wrote to memory of 2280 4608 backup.exe 94 PID 4608 wrote to memory of 2280 4608 backup.exe 94 PID 4608 wrote to memory of 4548 4608 backup.exe 95 PID 4608 wrote to memory of 4548 4608 backup.exe 95 PID 4608 wrote to memory of 4548 4608 backup.exe 95 PID 4548 wrote to memory of 4628 4548 backup.exe 96 PID 4548 wrote to memory of 4628 4548 backup.exe 96 PID 4548 wrote to memory of 4628 4548 backup.exe 96 PID 4548 wrote to memory of 1004 4548 backup.exe 97 PID 4548 wrote to memory of 1004 4548 backup.exe 97 PID 4548 wrote to memory of 1004 4548 backup.exe 97 PID 1004 wrote to memory of 4740 1004 backup.exe 98 PID 1004 wrote to memory of 4740 1004 backup.exe 98 PID 1004 wrote to memory of 4740 1004 backup.exe 98 PID 3568 wrote to memory of 4692 3568 backup.exe 100 PID 3568 wrote to memory of 4692 3568 backup.exe 100 PID 3568 wrote to memory of 4692 3568 backup.exe 100 PID 4548 wrote to memory of 2952 4548 backup.exe 101 PID 4548 wrote to memory of 2952 4548 backup.exe 101 PID 4548 wrote to memory of 2952 4548 backup.exe 101 PID 228 wrote to memory of 3876 228 backup.exe 104 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe"C:\Users\Admin\AppData\Local\Temp\20d233fda45b46c1e7cdaf96303c989883e952ec2f96aaf337d08b9d072c83bd.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\521223270\backup.exeC:\Users\Admin\AppData\Local\Temp\521223270\backup.exe C:\Users\Admin\AppData\Local\Temp\521223270\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4576
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Program Files\7-Zip\update.exe"C:\Program Files\7-Zip\update.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files\Common Files\DESIGNER\backup.exe"C:\Program Files\Common Files\DESIGNER\backup.exe" C:\Program Files\Common Files\DESIGNER\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280
-
-
C:\Program Files\Common Files\microsoft shared\backup.exe"C:\Program Files\Common Files\microsoft shared\backup.exe" C:\Program Files\Common Files\microsoft shared\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4548 -
C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe"C:\Program Files\Common Files\microsoft shared\ClickToRun\backup.exe" C:\Program Files\Common Files\microsoft shared\ClickToRun\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4628
-
-
C:\Program Files\Common Files\microsoft shared\ink\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1004 -
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4740
-
-
C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5100
-
-
C:\Program Files\Common Files\microsoft shared\ink\da-DK\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\da-DK\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1512
-
-
C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620
-
-
C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4240
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-GB\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-GB\8⤵PID:1196
-
-
C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\en-US\8⤵PID:3836
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-ES\System Restore.exe"C:\Program Files\Common Files\microsoft shared\ink\es-ES\System Restore.exe" C:\Program Files\Common Files\microsoft shared\ink\es-ES\8⤵
- System policy modification
PID:3736
-
-
C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\es-MX\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\es-MX\8⤵
- Modifies visibility of file extensions in Explorer
PID:4336
-
-
C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fi-FI\8⤵PID:3608
-
-
C:\Program Files\Common Files\microsoft shared\ink\et-EE\data.exe"C:\Program Files\Common Files\microsoft shared\ink\et-EE\data.exe" C:\Program Files\Common Files\microsoft shared\ink\et-EE\8⤵
- System policy modification
PID:1780
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-CA\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-CA\8⤵PID:3200
-
-
C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fr-FR\8⤵PID:856
-
-
C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\8⤵PID:3304
-
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1424
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3784
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1672
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- System policy modification
PID:3936
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\it-IT\8⤵PID:2836
-
-
C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\microsoft shared\MSInfo\ja-JP\8⤵PID:4296
-
-
-
C:\Program Files\Common Files\microsoft shared\OFFICE16\update.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\update.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2788 -
C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe"C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\backup.exe" C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3468
-
-
-
C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4976
-
-
C:\Program Files\Common Files\microsoft shared\Source Engine\data.exe"C:\Program Files\Common Files\microsoft shared\Source Engine\data.exe" C:\Program Files\Common Files\microsoft shared\Source Engine\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4224
-
-
C:\Program Files\Common Files\microsoft shared\Stationery\data.exe"C:\Program Files\Common Files\microsoft shared\Stationery\data.exe" C:\Program Files\Common Files\microsoft shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3424
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:5096
-
-
C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\7⤵PID:1720
-
C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\Triedit\en-US\8⤵PID:5116
-
-
-
C:\Program Files\Common Files\microsoft shared\VC\backup.exe"C:\Program Files\Common Files\microsoft shared\VC\backup.exe" C:\Program Files\Common Files\microsoft shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:360
-
-
C:\Program Files\Common Files\microsoft shared\VGX\backup.exe"C:\Program Files\Common Files\microsoft shared\VGX\backup.exe" C:\Program Files\Common Files\microsoft shared\VGX\7⤵
- System policy modification
PID:1876
-
-
C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2100 -
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\8⤵PID:1064
-
C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe"C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\backup.exe" C:\Program Files\Common Files\microsoft shared\VSTO\10.0\1033\9⤵PID:2336
-
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3788
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728 -
C:\Program Files\Common Files\System\ado\System Restore.exe"C:\Program Files\Common Files\System\ado\System Restore.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3388 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- System policy modification
PID:4116
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:4892
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
PID:4832
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵
- System policy modification
PID:3756
-
-
C:\Program Files\Common Files\System\ado\ja-JP\data.exe"C:\Program Files\Common Files\System\ado\ja-JP\data.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- System policy modification
PID:1292
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4448
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:4244
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:4412
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:4608
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1276
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Drops file in Program Files directory
PID:4104 -
C:\Program Files\Common Files\System\msadc\es-ES\backup.exe"C:\Program Files\Common Files\System\msadc\es-ES\backup.exe" C:\Program Files\Common Files\System\msadc\es-ES\8⤵PID:5104
-
-
C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe"C:\Program Files\Common Files\System\msadc\fr-FR\backup.exe" C:\Program Files\Common Files\System\msadc\fr-FR\8⤵PID:1552
-
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:4404
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3876 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Program Files\Google\Chrome\Application\update.exe"C:\Program Files\Google\Chrome\Application\update.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1440 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵
- Drops file in Program Files directory
PID:4316 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵
- Modifies visibility of file extensions in Explorer
PID:2548
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:5056
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\MEIPreload\9⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\swiftshader\9⤵
- Modifies visibility of file extensions in Explorer
PID:1348
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\9⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4520
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\System Restore.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\System Restore.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\9⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4952
-
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\update.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\update.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:1476
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4292 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4160
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:3604
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:2796
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- Modifies visibility of file extensions in Explorer
PID:3580
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
PID:4408
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4464
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵
- System policy modification
PID:4224
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:4880 -
C:\Program Files\Java\jdk1.8.0_66\data.exe"C:\Program Files\Java\jdk1.8.0_66\data.exe" C:\Program Files\Java\jdk1.8.0_66\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\bin\7⤵
- System policy modification
PID:1504
-
-
C:\Program Files\Java\jdk1.8.0_66\db\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3528 -
C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\lib\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\lib\8⤵PID:4752
-
-
-
C:\Program Files\Java\jdk1.8.0_66\include\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:4992 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\8⤵
- Drops file in Program Files directory
PID:4892 -
C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe"C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\backup.exe" C:\Program Files\Java\jdk1.8.0_66\include\win32\bridge\9⤵
- System policy modification
PID:2680
-
-
-
-
-
-
C:\Program Files\Microsoft Office\data.exe"C:\Program Files\Microsoft Office\data.exe" C:\Program Files\Microsoft Office\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Program Files\Microsoft Office\Office16\backup.exe"C:\Program Files\Microsoft Office\Office16\backup.exe" C:\Program Files\Microsoft Office\Office16\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3192
-
-
C:\Program Files\Microsoft Office\PackageManifests\backup.exe"C:\Program Files\Microsoft Office\PackageManifests\backup.exe" C:\Program Files\Microsoft Office\PackageManifests\6⤵
- Modifies visibility of file extensions in Explorer
PID:4936
-
-
C:\Program Files\Microsoft Office\root\backup.exe"C:\Program Files\Microsoft Office\root\backup.exe" C:\Program Files\Microsoft Office\root\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2480 -
C:\Program Files\Microsoft Office\root\Client\backup.exe"C:\Program Files\Microsoft Office\root\Client\backup.exe" C:\Program Files\Microsoft Office\root\Client\7⤵PID:3512
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\7⤵
- Drops file in Program Files directory
- System policy modification
PID:872 -
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\8⤵
- Modifies visibility of file extensions in Explorer
PID:1308
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\data.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\data.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4988
-
-
C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\backup.exe"C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\backup.exe" C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\8⤵
- Modifies visibility of file extensions in Explorer
PID:3212
-
-
-
C:\Program Files\Microsoft Office\root\fre\backup.exe"C:\Program Files\Microsoft Office\root\fre\backup.exe" C:\Program Files\Microsoft Office\root\fre\7⤵PID:480
-
-
C:\Program Files\Microsoft Office\root\Integration\backup.exe"C:\Program Files\Microsoft Office\root\Integration\backup.exe" C:\Program Files\Microsoft Office\root\Integration\7⤵PID:1008
-
-
C:\Program Files\Microsoft Office\root\Licenses\backup.exe"C:\Program Files\Microsoft Office\root\Licenses\backup.exe" C:\Program Files\Microsoft Office\root\Licenses\7⤵PID:2160
-
-
-
-
C:\Program Files\Microsoft Office 15\data.exe"C:\Program Files\Microsoft Office 15\data.exe" C:\Program Files\Microsoft Office 15\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1144 -
C:\Program Files\Microsoft Office 15\ClientX64\update.exe"C:\Program Files\Microsoft Office 15\ClientX64\update.exe" C:\Program Files\Microsoft Office 15\ClientX64\6⤵
- Modifies visibility of file extensions in Explorer
PID:1420
-
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵
- Drops file in Program Files directory
PID:2784 -
C:\Program Files\Mozilla Firefox\defaults\backup.exe"C:\Program Files\Mozilla Firefox\defaults\backup.exe" C:\Program Files\Mozilla Firefox\defaults\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4132 -
C:\Program Files\Mozilla Firefox\defaults\pref\backup.exe"C:\Program Files\Mozilla Firefox\defaults\pref\backup.exe" C:\Program Files\Mozilla Firefox\defaults\pref\7⤵PID:2860
-
-
-
C:\Program Files\Mozilla Firefox\fonts\backup.exe"C:\Program Files\Mozilla Firefox\fonts\backup.exe" C:\Program Files\Mozilla Firefox\fonts\6⤵PID:1820
-
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2408
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4692 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4676 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\7⤵PID:2340
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:5072 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\8⤵PID:1436
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\9⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4008
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\8⤵PID:5092
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\8⤵PID:2120
-
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\7⤵PID:2464
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Program Files (x86)\Common Files\Adobe\update.exe"C:\Program Files (x86)\Common Files\Adobe\update.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4140 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:4520
-
-
C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2472 -
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4588
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\7⤵PID:4804
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\8⤵PID:60
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\9⤵PID:3512
-
-
-
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\7⤵
- Drops file in Program Files directory
PID:728
-
-
-
C:\Program Files (x86)\Common Files\Java\backup.exe"C:\Program Files (x86)\Common Files\Java\backup.exe" C:\Program Files (x86)\Common Files\Java\6⤵PID:4908
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:3752
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:3232
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:700
-
-
C:\Program Files (x86)\Google\Update\System Restore.exe"C:\Program Files (x86)\Google\Update\System Restore.exe" C:\Program Files (x86)\Google\Update\6⤵
- Modifies visibility of file extensions in Explorer
PID:1172 -
C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\backup.exe" C:\Program Files (x86)\Google\Update\1.3.36.71\7⤵
- System policy modification
PID:4344
-
-
C:\Program Files (x86)\Google\Update\Download\backup.exe"C:\Program Files (x86)\Google\Update\Download\backup.exe" C:\Program Files (x86)\Google\Update\Download\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1128 -
C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\backup.exe"C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\backup.exe" C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\8⤵PID:1832
-
C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\backup.exe"C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\backup.exe" C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\89.0.4389.114\9⤵
- System policy modification
PID:2900
-
-
-
-
C:\Program Files (x86)\Google\Update\Install\backup.exe"C:\Program Files (x86)\Google\Update\Install\backup.exe" C:\Program Files (x86)\Google\Update\Install\7⤵PID:4440
-
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:3508
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1540 -
C:\Users\Admin\3D Objects\backup.exe"C:\Users\Admin\3D Objects\backup.exe" C:\Users\Admin\3D Objects\6⤵
- Modifies visibility of file extensions in Explorer
PID:2896
-
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:1008
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
PID:2440
-
-
C:\Users\Admin\Downloads\data.exeC:\Users\Admin\Downloads\data.exe C:\Users\Admin\Downloads\6⤵PID:4180
-
-
C:\Users\Admin\Favorites\update.exeC:\Users\Admin\Favorites\update.exe C:\Users\Admin\Favorites\6⤵PID:2164
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1424
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1312
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:5108
-
-
C:\Users\Admin\OneDrive\backup.exeC:\Users\Admin\OneDrive\backup.exe C:\Users\Admin\OneDrive\6⤵PID:1696
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- System policy modification
PID:968
-
-
C:\Users\Public\Downloads\data.exeC:\Users\Public\Downloads\data.exe C:\Users\Public\Downloads\6⤵PID:2860
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:3852
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵
- Modifies visibility of file extensions in Explorer
PID:2532
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵PID:4432
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456
-
-
C:\Windows\appcompat\data.exeC:\Windows\appcompat\data.exe C:\Windows\appcompat\5⤵
- Drops file in Windows directory
PID:4524 -
C:\Windows\appcompat\appraiser\backup.exeC:\Windows\appcompat\appraiser\backup.exe C:\Windows\appcompat\appraiser\6⤵
- Drops file in Windows directory
- System policy modification
PID:3360 -
C:\Windows\appcompat\appraiser\Telemetry\backup.exeC:\Windows\appcompat\appraiser\Telemetry\backup.exe C:\Windows\appcompat\appraiser\Telemetry\7⤵PID:856
-
-
-
C:\Windows\appcompat\encapsulation\backup.exeC:\Windows\appcompat\encapsulation\backup.exe C:\Windows\appcompat\encapsulation\6⤵
- System policy modification
PID:1168
-
-
C:\Windows\appcompat\Programs\System Restore.exe"C:\Windows\appcompat\Programs\System Restore.exe" C:\Windows\appcompat\Programs\6⤵
- System policy modification
PID:2368
-
-
-
C:\Windows\apppatch\backup.exeC:\Windows\apppatch\backup.exe C:\Windows\apppatch\5⤵
- Drops file in Windows directory
PID:3116 -
C:\Windows\apppatch\AppPatch64\backup.exeC:\Windows\apppatch\AppPatch64\backup.exe C:\Windows\apppatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
PID:3264
-
-
C:\Windows\apppatch\Custom\backup.exeC:\Windows\apppatch\Custom\backup.exe C:\Windows\apppatch\Custom\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
PID:1416 -
C:\Windows\apppatch\Custom\Custom64\backup.exeC:\Windows\apppatch\Custom\Custom64\backup.exe C:\Windows\apppatch\Custom\Custom64\7⤵PID:2316
-
-
-
-
C:\Windows\AppReadiness\backup.exeC:\Windows\AppReadiness\backup.exe C:\Windows\AppReadiness\5⤵PID:4184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3604
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1528
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4904
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5016
-
-
C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\microsoft shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\microsoft shared\TextConv\en-US\1⤵
- System policy modification
PID:1744
-
C:\Program Files\Mozilla Firefox\browser\backup.exe"C:\Program Files\Mozilla Firefox\browser\backup.exe" C:\Program Files\Mozilla Firefox\browser\1⤵
- Drops file in Program Files directory
PID:1616 -
C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe"C:\Program Files\Mozilla Firefox\browser\VisualElements\backup.exe" C:\Program Files\Mozilla Firefox\browser\VisualElements\2⤵
- Modifies visibility of file extensions in Explorer
PID:3696
-
-
C:\Program Files\Mozilla Firefox\browser\features\backup.exe"C:\Program Files\Mozilla Firefox\browser\features\backup.exe" C:\Program Files\Mozilla Firefox\browser\features\2⤵PID:804
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\1⤵
- Drops file in Program Files directory
PID:3896 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\backup.exe" C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\2⤵
- Modifies visibility of file extensions in Explorer
PID:4772
-
-
C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe"C:\Program Files\Java\jdk1.8.0_66\db\bin\backup.exe" C:\Program Files\Java\jdk1.8.0_66\db\bin\1⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:4764
-
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\1⤵
- System policy modification
PID:3664
-
C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\HelpCfg\en_US\1⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1456
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\1⤵PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD560123b4ae22ff15eefad02650c56e389
SHA1e504ba577e8836dbed3d55ce5f2702b2ed022184
SHA25623101d9f6955370ad44123c4b984380c052b27166ffb39f8a7ab7296d1913fd2
SHA512c0304980dc4abd246a947d79bde98233a9ca0db57bc5e5d9495077312e55f4936636cfe17b81c3902ff74dad79a80213db4b782c4959da91ab8f53134289d6bb
-
Filesize
72KB
MD560123b4ae22ff15eefad02650c56e389
SHA1e504ba577e8836dbed3d55ce5f2702b2ed022184
SHA25623101d9f6955370ad44123c4b984380c052b27166ffb39f8a7ab7296d1913fd2
SHA512c0304980dc4abd246a947d79bde98233a9ca0db57bc5e5d9495077312e55f4936636cfe17b81c3902ff74dad79a80213db4b782c4959da91ab8f53134289d6bb
-
Filesize
72KB
MD5047a002ba2d19f961112c58d5e0976eb
SHA10706701b589ba2377978076c5fb2e0825aa8b1d6
SHA2568d4cd10f4164752d8a59940144d83d610116e6ad54d96e445a08317941efffd2
SHA512244f5a08ec5ff26a2302e77faf0195651dd7394659e387a515b29c82c3a57f568a0c1df58f82f23cf5f9db50dd3cea06e6b5ea69a42d207062c13394c7c52804
-
Filesize
72KB
MD54385ada6053e1a7acad76b02a3acad6e
SHA1039237831b9725060cd1c4ad36ad9d38e4e7824f
SHA256f4dee327a2daacbe148a65ded2c25bfc052508b3ef3a7609bb1010da7dac9890
SHA512d27b4606db53c941fdba76338b4cda64951c4f4a09431c402cbde8d49a14316553437b2ba2d41522504d68142d1d2f3aad54439f1b526a3bbf924a3022715b32
-
Filesize
72KB
MD54385ada6053e1a7acad76b02a3acad6e
SHA1039237831b9725060cd1c4ad36ad9d38e4e7824f
SHA256f4dee327a2daacbe148a65ded2c25bfc052508b3ef3a7609bb1010da7dac9890
SHA512d27b4606db53c941fdba76338b4cda64951c4f4a09431c402cbde8d49a14316553437b2ba2d41522504d68142d1d2f3aad54439f1b526a3bbf924a3022715b32
-
Filesize
72KB
MD54c3d921869f8e86b30539a703c0b2c5e
SHA1b7bfb515dba696b6f874a7f2259a76b0e79d5919
SHA25629583d2182e121a6d142b725aad7fd6294c693fa15235323f09a0b50bc632df4
SHA51215c1966069b1660210df4cb1bf0a9d34888b25ebcd50c99b020d60e8298c3581d825164ddcfa2e3d7af30c4bf10d10adc689abaaacbe9803974e752cf8c897e9
-
Filesize
72KB
MD54c3d921869f8e86b30539a703c0b2c5e
SHA1b7bfb515dba696b6f874a7f2259a76b0e79d5919
SHA25629583d2182e121a6d142b725aad7fd6294c693fa15235323f09a0b50bc632df4
SHA51215c1966069b1660210df4cb1bf0a9d34888b25ebcd50c99b020d60e8298c3581d825164ddcfa2e3d7af30c4bf10d10adc689abaaacbe9803974e752cf8c897e9
-
Filesize
72KB
MD5918c2a25864366ca691fc1093b111297
SHA1ca0ea2d98c794f5fbed2c80532f977a7ffb5d5d1
SHA256f88920eec404fa847134eeafc49df2dae2bf4ebe17823d681941eec6e58f7546
SHA512e54338a7273724f5addbf8d2bb7769ade8a789cc7e559768ea0ef8848d28ee00760179bd6539bd64c30345d175599fd669799883a4fa13b76321f10b48e8411f
-
Filesize
72KB
MD5918c2a25864366ca691fc1093b111297
SHA1ca0ea2d98c794f5fbed2c80532f977a7ffb5d5d1
SHA256f88920eec404fa847134eeafc49df2dae2bf4ebe17823d681941eec6e58f7546
SHA512e54338a7273724f5addbf8d2bb7769ade8a789cc7e559768ea0ef8848d28ee00760179bd6539bd64c30345d175599fd669799883a4fa13b76321f10b48e8411f
-
Filesize
72KB
MD54c3d921869f8e86b30539a703c0b2c5e
SHA1b7bfb515dba696b6f874a7f2259a76b0e79d5919
SHA25629583d2182e121a6d142b725aad7fd6294c693fa15235323f09a0b50bc632df4
SHA51215c1966069b1660210df4cb1bf0a9d34888b25ebcd50c99b020d60e8298c3581d825164ddcfa2e3d7af30c4bf10d10adc689abaaacbe9803974e752cf8c897e9
-
Filesize
72KB
MD54c3d921869f8e86b30539a703c0b2c5e
SHA1b7bfb515dba696b6f874a7f2259a76b0e79d5919
SHA25629583d2182e121a6d142b725aad7fd6294c693fa15235323f09a0b50bc632df4
SHA51215c1966069b1660210df4cb1bf0a9d34888b25ebcd50c99b020d60e8298c3581d825164ddcfa2e3d7af30c4bf10d10adc689abaaacbe9803974e752cf8c897e9
-
Filesize
72KB
MD5dfd6f3dcefe013bf1a1628f585ff2e4a
SHA16605935004d749a8b82e45f83f221f027971b89d
SHA256ecc8e021505c53ee228f6da4eb185a7a5999ff8cb7c5843eace7e23874d3e7fc
SHA5124d6d874e4c2f375dbaa67e6a9166f33bf6f1cd72d573c71af2e65e9c88729ea14e872b060f2c0d5e6e307c13ae8e9fd4004714a49f8ac258e25d65efb970d811
-
Filesize
72KB
MD5dfd6f3dcefe013bf1a1628f585ff2e4a
SHA16605935004d749a8b82e45f83f221f027971b89d
SHA256ecc8e021505c53ee228f6da4eb185a7a5999ff8cb7c5843eace7e23874d3e7fc
SHA5124d6d874e4c2f375dbaa67e6a9166f33bf6f1cd72d573c71af2e65e9c88729ea14e872b060f2c0d5e6e307c13ae8e9fd4004714a49f8ac258e25d65efb970d811
-
Filesize
72KB
MD5fc67527587787cd12ab2a796254a783c
SHA1fce334f037efa494c404e434a7c966ff22b73a93
SHA256ecbf698805458dfdfd316cc5c955a6f7d48a2d4b29f3590cbd4d4918c1488449
SHA51237c1e6d5d818abfc2239d7c4499d864045ccb73a959eed26f13222eb94156fee533ed2c8211d856f06e338c82542198322a22c67d2bd0f636f69637a8fca07c4
-
Filesize
72KB
MD5fc67527587787cd12ab2a796254a783c
SHA1fce334f037efa494c404e434a7c966ff22b73a93
SHA256ecbf698805458dfdfd316cc5c955a6f7d48a2d4b29f3590cbd4d4918c1488449
SHA51237c1e6d5d818abfc2239d7c4499d864045ccb73a959eed26f13222eb94156fee533ed2c8211d856f06e338c82542198322a22c67d2bd0f636f69637a8fca07c4
-
Filesize
72KB
MD5918c2a25864366ca691fc1093b111297
SHA1ca0ea2d98c794f5fbed2c80532f977a7ffb5d5d1
SHA256f88920eec404fa847134eeafc49df2dae2bf4ebe17823d681941eec6e58f7546
SHA512e54338a7273724f5addbf8d2bb7769ade8a789cc7e559768ea0ef8848d28ee00760179bd6539bd64c30345d175599fd669799883a4fa13b76321f10b48e8411f
-
Filesize
72KB
MD5918c2a25864366ca691fc1093b111297
SHA1ca0ea2d98c794f5fbed2c80532f977a7ffb5d5d1
SHA256f88920eec404fa847134eeafc49df2dae2bf4ebe17823d681941eec6e58f7546
SHA512e54338a7273724f5addbf8d2bb7769ade8a789cc7e559768ea0ef8848d28ee00760179bd6539bd64c30345d175599fd669799883a4fa13b76321f10b48e8411f
-
Filesize
72KB
MD5cce6ca96254c4a93f8313ef185976000
SHA1d3a71c149b7f5678c545392258d3bf201b7032ed
SHA2566e290c1bdce79ea285ca0ca48e4e9e6f3fbcdeb9410becbfecb1110c48ffbff5
SHA512f45216599fdfe1baf8e0b96421f17ecefac4227deac8f36ec23fe160ea8d3344851cd6fa9869a8ac4a2f5fd35cd01795bbe45a634a15ac969c689449742bfe6c
-
Filesize
72KB
MD5cce6ca96254c4a93f8313ef185976000
SHA1d3a71c149b7f5678c545392258d3bf201b7032ed
SHA2566e290c1bdce79ea285ca0ca48e4e9e6f3fbcdeb9410becbfecb1110c48ffbff5
SHA512f45216599fdfe1baf8e0b96421f17ecefac4227deac8f36ec23fe160ea8d3344851cd6fa9869a8ac4a2f5fd35cd01795bbe45a634a15ac969c689449742bfe6c
-
Filesize
72KB
MD5ae03984e9d05c57b0dda800832c3d404
SHA10a395bc66e25940cd742886cca13112438ff7eb1
SHA2561c6a375f7f237b43abc0d6004a6bf6439da805c6886cff30485a2b7d88b52457
SHA5124daed1a17d55a3e8ba02aa974880483b5e08eb064ed37a9523cc64793f78559283fa41792a1761a56b12402e99ded1327c44a844804fe927536c46fa738ea4e2
-
Filesize
72KB
MD5ae03984e9d05c57b0dda800832c3d404
SHA10a395bc66e25940cd742886cca13112438ff7eb1
SHA2561c6a375f7f237b43abc0d6004a6bf6439da805c6886cff30485a2b7d88b52457
SHA5124daed1a17d55a3e8ba02aa974880483b5e08eb064ed37a9523cc64793f78559283fa41792a1761a56b12402e99ded1327c44a844804fe927536c46fa738ea4e2
-
Filesize
72KB
MD5d0a8c604a96bac20528dbb46e5040d9c
SHA11363be4b8329b0face51c452c64e82e441bda660
SHA2565d9ef57edf3c561e4706aafad0bbfd7871c44b7da35b9f53e4d50a4f5342dda5
SHA512351fc1ffe4a5459b9c927106e3e4aa96aa9cb4d02d4d1119464c6de039377ddffaeb1b9adc6fb6f12dc79d806492dab510d338c330ae55c67e6e2360bbd8f7f1
-
Filesize
72KB
MD5d0a8c604a96bac20528dbb46e5040d9c
SHA11363be4b8329b0face51c452c64e82e441bda660
SHA2565d9ef57edf3c561e4706aafad0bbfd7871c44b7da35b9f53e4d50a4f5342dda5
SHA512351fc1ffe4a5459b9c927106e3e4aa96aa9cb4d02d4d1119464c6de039377ddffaeb1b9adc6fb6f12dc79d806492dab510d338c330ae55c67e6e2360bbd8f7f1
-
Filesize
72KB
MD501a0605a2bbdf13ae319d62be0374416
SHA1995838fc13b1caf609ec495dc900a163934eeda0
SHA256bf28a8d6fa8cd03b9722529f42902c34ea958b1f7b29bf9a826bad84faa3a450
SHA5123ec8dead989ff3a02e7753ee8c0aa8ac3703eeeb11fb2d69a355f9d5a85c62400e2b889ef97e5e145a368b1d8f0f9ea79e7ca948827b4a1b75fe4a8d531e2812
-
Filesize
72KB
MD544dc2459cf4374dd2965945c248d2666
SHA15ab3a557056c5f161009dad7a7704bba8aaab236
SHA256dce9bc923663b65a9dc39c9122a88022d6798866097d18d576417653999bc08e
SHA5128a433b2874eb3906fc4635c7965a5e1b7165a746d3134313f44c1ead3dbb1f3672482597c4e1a4a049c3274ebb84a3d948c94cc4e7b6e00e2f99ea0fb2eca8c0
-
Filesize
72KB
MD544dc2459cf4374dd2965945c248d2666
SHA15ab3a557056c5f161009dad7a7704bba8aaab236
SHA256dce9bc923663b65a9dc39c9122a88022d6798866097d18d576417653999bc08e
SHA5128a433b2874eb3906fc4635c7965a5e1b7165a746d3134313f44c1ead3dbb1f3672482597c4e1a4a049c3274ebb84a3d948c94cc4e7b6e00e2f99ea0fb2eca8c0
-
Filesize
72KB
MD534e544d942746564d881fee8a85ac95b
SHA115d9161bd6374d64ed4333d8cbc677444f8ccf3d
SHA256d60961bbddce74f63c0d2f3c515d7f6dab0f6e3def108757d29499519de3f4ee
SHA51225ee63d512b0f5a38193d45889ef233935b5f3daaec29511d819ae4de2815709a599d42df86f9ce446971178e50c63515b65f975e2a896c64b16d8ccab8064ba
-
Filesize
72KB
MD534e544d942746564d881fee8a85ac95b
SHA115d9161bd6374d64ed4333d8cbc677444f8ccf3d
SHA256d60961bbddce74f63c0d2f3c515d7f6dab0f6e3def108757d29499519de3f4ee
SHA51225ee63d512b0f5a38193d45889ef233935b5f3daaec29511d819ae4de2815709a599d42df86f9ce446971178e50c63515b65f975e2a896c64b16d8ccab8064ba
-
Filesize
72KB
MD5cce6ca96254c4a93f8313ef185976000
SHA1d3a71c149b7f5678c545392258d3bf201b7032ed
SHA2566e290c1bdce79ea285ca0ca48e4e9e6f3fbcdeb9410becbfecb1110c48ffbff5
SHA512f45216599fdfe1baf8e0b96421f17ecefac4227deac8f36ec23fe160ea8d3344851cd6fa9869a8ac4a2f5fd35cd01795bbe45a634a15ac969c689449742bfe6c
-
Filesize
72KB
MD5cce6ca96254c4a93f8313ef185976000
SHA1d3a71c149b7f5678c545392258d3bf201b7032ed
SHA2566e290c1bdce79ea285ca0ca48e4e9e6f3fbcdeb9410becbfecb1110c48ffbff5
SHA512f45216599fdfe1baf8e0b96421f17ecefac4227deac8f36ec23fe160ea8d3344851cd6fa9869a8ac4a2f5fd35cd01795bbe45a634a15ac969c689449742bfe6c
-
Filesize
72KB
MD54e93de35ea7228a055ca92f9be1e3d43
SHA1e8f667cd6388b657554b5349057be4d872d65601
SHA256844b6f80396e850f0e594c6b8f42d22bfec469f6e698fe91c62db18ddc9fb9f2
SHA512c4860f4a3ed114c7eb48604a25e72a2199260ae0e9294f30f19649e2959a7445e0a6b5a10a3aa7f9c13f927a57bd416e3026e70295372bea3685032d4ecbd456
-
Filesize
72KB
MD54e93de35ea7228a055ca92f9be1e3d43
SHA1e8f667cd6388b657554b5349057be4d872d65601
SHA256844b6f80396e850f0e594c6b8f42d22bfec469f6e698fe91c62db18ddc9fb9f2
SHA512c4860f4a3ed114c7eb48604a25e72a2199260ae0e9294f30f19649e2959a7445e0a6b5a10a3aa7f9c13f927a57bd416e3026e70295372bea3685032d4ecbd456
-
Filesize
72KB
MD5c8467d9ec0d2cde09ebccb76d30be8cd
SHA1a6876131ac4cf5e348d69d53b2188e12ac64ace4
SHA256bb38c4fc3480f5db495c9959691af075beef40c29b5b0586047f22db50178f33
SHA5120c7e5edfb7dc68fe942b45aa71316694c9bf9ce007952a030a505535e7c396ab90d493d8f8dc4b5c63a9a87553dac0a93ebe296275ccc04d72a925bccb3376f2
-
Filesize
72KB
MD5c8467d9ec0d2cde09ebccb76d30be8cd
SHA1a6876131ac4cf5e348d69d53b2188e12ac64ace4
SHA256bb38c4fc3480f5db495c9959691af075beef40c29b5b0586047f22db50178f33
SHA5120c7e5edfb7dc68fe942b45aa71316694c9bf9ce007952a030a505535e7c396ab90d493d8f8dc4b5c63a9a87553dac0a93ebe296275ccc04d72a925bccb3376f2
-
Filesize
72KB
MD5106514731344c128d131610a16682c42
SHA1df24b34ed1659e6a8b1044704125821209da8e53
SHA256a5342bb3377b4c4ad0180b2f0786d82ce25c399dc464619942eeb0525facbeae
SHA5127893e430d9742b02529be1c7bd92d7360e78b92a4bc79545fc9f8a412f4da2639177c582203d9c15681b40c41540f192b5f3a32be49e72945e10c4c8817835cd
-
Filesize
72KB
MD5d290c1f6f85c925b4fee491ee5db5bbc
SHA17c285403442b581b72414ed295e5e17f281cd248
SHA25684bec6d6168160185e5ec8e3cffbf0499dceb40b99ffc7157895a9bdfa0d49d5
SHA512cb7748c6c74d0f31e1b68a3fe43e843a7a917c86524e2cc0b7c18df9cb9575d041633f9ce4121e70c8614d6464d9afa75730f5f29c1d862f7d38d8a30d5b2f6b
-
Filesize
72KB
MD5101514191392089fdea8c69be0338538
SHA123997e1a322a64b897dcd708ba4ea1734a9809e2
SHA256135a72a4b346e9bccb2504718708986ad72da2830ae74c8d03297190f298cf4c
SHA5121184ec3f4a6bb1f7c15ad103bbe9d9385884debd000df63058cc6c8d1377d06289e25f5a6e6db5f2c91dbb60991b56249d99120c8a4e77a3f9b8f53a828d8bc2
-
Filesize
72KB
MD5101514191392089fdea8c69be0338538
SHA123997e1a322a64b897dcd708ba4ea1734a9809e2
SHA256135a72a4b346e9bccb2504718708986ad72da2830ae74c8d03297190f298cf4c
SHA5121184ec3f4a6bb1f7c15ad103bbe9d9385884debd000df63058cc6c8d1377d06289e25f5a6e6db5f2c91dbb60991b56249d99120c8a4e77a3f9b8f53a828d8bc2
-
Filesize
72KB
MD513a0786478692e97934e7e1ca7c0e36e
SHA1550a8be95cff08376e276d565bada7e3f81eb0d2
SHA2568f40e34a2359ac438ca92609b22596e93e00bfe6a0f570945af9eedfc9537e1a
SHA5121a40054907e12cf288df145e364beb9d71e8c6d5c42401ace9668ade26956f97c497868fcc48ed77cf085bee473f97211e325f34519f71f3f0f2b0e8aace9909
-
Filesize
72KB
MD513a0786478692e97934e7e1ca7c0e36e
SHA1550a8be95cff08376e276d565bada7e3f81eb0d2
SHA2568f40e34a2359ac438ca92609b22596e93e00bfe6a0f570945af9eedfc9537e1a
SHA5121a40054907e12cf288df145e364beb9d71e8c6d5c42401ace9668ade26956f97c497868fcc48ed77cf085bee473f97211e325f34519f71f3f0f2b0e8aace9909
-
Filesize
72KB
MD5bd8d1e2ce32631e179e1dc04a2960b85
SHA13477568f296d55f4c04a353bcff0450d66354b6c
SHA256ea5fc65a663866a6d1ee43417def15e5ccf6d411425107f2236408c41deaed33
SHA5126fe0853b1bdb739d96a098b847d49db1eff50cfef4cfa458df3dfaa4e6d4bf626e923715071a713ff6741efac2c8efd80a0b737ff4ade363c7fdf7790942c753
-
Filesize
72KB
MD506d4a8236ab1471daedddea3b31c9674
SHA14f9eb9d50ce1d4e165a639c6a0e68cec27682f82
SHA2561c3498a4164ccda736da7045a8ea6d0ff76dc1c90582e0a4c6c5a8042a325510
SHA51272842a19abb4f645d6376c4c61922d4c2817f8ec41f168d6ff7f2cec927eef24c7927e984b7b27b4b4b127c7c10819c71175290a5902476bef011dbde0377d0d
-
Filesize
72KB
MD506d4a8236ab1471daedddea3b31c9674
SHA14f9eb9d50ce1d4e165a639c6a0e68cec27682f82
SHA2561c3498a4164ccda736da7045a8ea6d0ff76dc1c90582e0a4c6c5a8042a325510
SHA51272842a19abb4f645d6376c4c61922d4c2817f8ec41f168d6ff7f2cec927eef24c7927e984b7b27b4b4b127c7c10819c71175290a5902476bef011dbde0377d0d
-
Filesize
72KB
MD544b5413495155dc9cbecf053638742aa
SHA1ca51e0143954899908e8627b43d4168c7e625914
SHA256fa532703662ce9d055eba26b56eb7cff02811bf464637a7edf48c345e88cb3d0
SHA512a333e5648a326804ce1da99a74bb891deb567cb711e920bb5a23a83a48e8e1363a21a5dae66aa9bf3cd3bc9d2aac61f346148b480d9be6ad144ed7e47b60600c
-
Filesize
72KB
MD544b5413495155dc9cbecf053638742aa
SHA1ca51e0143954899908e8627b43d4168c7e625914
SHA256fa532703662ce9d055eba26b56eb7cff02811bf464637a7edf48c345e88cb3d0
SHA512a333e5648a326804ce1da99a74bb891deb567cb711e920bb5a23a83a48e8e1363a21a5dae66aa9bf3cd3bc9d2aac61f346148b480d9be6ad144ed7e47b60600c
-
Filesize
72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
Filesize
72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\data.exe
Filesize72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d49cbba8666d0228f4c53006684e37e9
SHA166046a9fb8ce183e1d2892758cb62931bbeef276
SHA2562c405bd807a998a5c6dfcffca0ef458031a56b65c858eb824f1ced9b397428a2
SHA512e5b916c4273117cae09b7a3026f2399dc3319fcdec373c24ced14b76c2b906989c7b6c38163e3a8a6835cccfdf73447b282197e197cd898517a8d3ed16175aa6
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d49cbba8666d0228f4c53006684e37e9
SHA166046a9fb8ce183e1d2892758cb62931bbeef276
SHA2562c405bd807a998a5c6dfcffca0ef458031a56b65c858eb824f1ced9b397428a2
SHA512e5b916c4273117cae09b7a3026f2399dc3319fcdec373c24ced14b76c2b906989c7b6c38163e3a8a6835cccfdf73447b282197e197cd898517a8d3ed16175aa6
-
Filesize
72KB
MD544b5413495155dc9cbecf053638742aa
SHA1ca51e0143954899908e8627b43d4168c7e625914
SHA256fa532703662ce9d055eba26b56eb7cff02811bf464637a7edf48c345e88cb3d0
SHA512a333e5648a326804ce1da99a74bb891deb567cb711e920bb5a23a83a48e8e1363a21a5dae66aa9bf3cd3bc9d2aac61f346148b480d9be6ad144ed7e47b60600c
-
Filesize
72KB
MD544b5413495155dc9cbecf053638742aa
SHA1ca51e0143954899908e8627b43d4168c7e625914
SHA256fa532703662ce9d055eba26b56eb7cff02811bf464637a7edf48c345e88cb3d0
SHA512a333e5648a326804ce1da99a74bb891deb567cb711e920bb5a23a83a48e8e1363a21a5dae66aa9bf3cd3bc9d2aac61f346148b480d9be6ad144ed7e47b60600c
-
Filesize
72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
Filesize
72KB
MD5afcb9f095ba7221aade5da5801e0c348
SHA193a6180746c09826176173b2fa958525cc9669ec
SHA256708340c7afc8743aeb733e534e6b794fe16d83f9e31b2d147204fa6c694aec17
SHA5121ed7c46f23a3c81fca31a10250d8852ca85705cdde96403d8cfd9f6243ba7d0e18c26a10823cc9ab1ca936ae1fa21c1c339025129278524dbe0d40a1a3152b89
-
Filesize
72KB
MD5d49cbba8666d0228f4c53006684e37e9
SHA166046a9fb8ce183e1d2892758cb62931bbeef276
SHA2562c405bd807a998a5c6dfcffca0ef458031a56b65c858eb824f1ced9b397428a2
SHA512e5b916c4273117cae09b7a3026f2399dc3319fcdec373c24ced14b76c2b906989c7b6c38163e3a8a6835cccfdf73447b282197e197cd898517a8d3ed16175aa6
-
Filesize
72KB
MD5d49cbba8666d0228f4c53006684e37e9
SHA166046a9fb8ce183e1d2892758cb62931bbeef276
SHA2562c405bd807a998a5c6dfcffca0ef458031a56b65c858eb824f1ced9b397428a2
SHA512e5b916c4273117cae09b7a3026f2399dc3319fcdec373c24ced14b76c2b906989c7b6c38163e3a8a6835cccfdf73447b282197e197cd898517a8d3ed16175aa6
-
Filesize
72KB
MD50521e037a1df5473306d49d728bd44ce
SHA110109e3ec41c32cb54baf2f0647f8b0fd4cafdac
SHA256065a27a6f045af30ceea0279163b547a6ea1fd439aafdae7b93e27efe8f0d2cb
SHA5126fdd65d34a5e195610698530f984618798a4f9eb6696061d8d6399496d82970f804a2a473fe9d7b70714b7dc46298adc2a27084985d11ab1dce1071749fcebce
-
Filesize
72KB
MD50521e037a1df5473306d49d728bd44ce
SHA110109e3ec41c32cb54baf2f0647f8b0fd4cafdac
SHA256065a27a6f045af30ceea0279163b547a6ea1fd439aafdae7b93e27efe8f0d2cb
SHA5126fdd65d34a5e195610698530f984618798a4f9eb6696061d8d6399496d82970f804a2a473fe9d7b70714b7dc46298adc2a27084985d11ab1dce1071749fcebce
-
Filesize
72KB
MD560123b4ae22ff15eefad02650c56e389
SHA1e504ba577e8836dbed3d55ce5f2702b2ed022184
SHA25623101d9f6955370ad44123c4b984380c052b27166ffb39f8a7ab7296d1913fd2
SHA512c0304980dc4abd246a947d79bde98233a9ca0db57bc5e5d9495077312e55f4936636cfe17b81c3902ff74dad79a80213db4b782c4959da91ab8f53134289d6bb
-
Filesize
72KB
MD56bafb90c375a018716296ec2e4b10d03
SHA1d214a85f0302ac819479e75220ab9ec568addd25
SHA256d8417c9b4f08866d7cc62a39e05435f061c621a27237b22d634d1a6c05daf341
SHA512581c242aff902b7a6b7d76577f67b4c3160054c28e17e45db2d6a474dad699487aec2e03102c19e95d0fc252659f97ddde6ac44fa4fbab6b1bafe61e0f12d3c5
-
Filesize
72KB
MD56bafb90c375a018716296ec2e4b10d03
SHA1d214a85f0302ac819479e75220ab9ec568addd25
SHA256d8417c9b4f08866d7cc62a39e05435f061c621a27237b22d634d1a6c05daf341
SHA512581c242aff902b7a6b7d76577f67b4c3160054c28e17e45db2d6a474dad699487aec2e03102c19e95d0fc252659f97ddde6ac44fa4fbab6b1bafe61e0f12d3c5
-
Filesize
72KB
MD560123b4ae22ff15eefad02650c56e389
SHA1e504ba577e8836dbed3d55ce5f2702b2ed022184
SHA25623101d9f6955370ad44123c4b984380c052b27166ffb39f8a7ab7296d1913fd2
SHA512c0304980dc4abd246a947d79bde98233a9ca0db57bc5e5d9495077312e55f4936636cfe17b81c3902ff74dad79a80213db4b782c4959da91ab8f53134289d6bb
-
Filesize
72KB
MD560123b4ae22ff15eefad02650c56e389
SHA1e504ba577e8836dbed3d55ce5f2702b2ed022184
SHA25623101d9f6955370ad44123c4b984380c052b27166ffb39f8a7ab7296d1913fd2
SHA512c0304980dc4abd246a947d79bde98233a9ca0db57bc5e5d9495077312e55f4936636cfe17b81c3902ff74dad79a80213db4b782c4959da91ab8f53134289d6bb