Analysis
-
max time kernel
186s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 19:34
Static task
static1
Behavioral task
behavioral1
Sample
dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe
Resource
win10v2004-20220812-en
General
-
Target
dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe
-
Size
72KB
-
MD5
21f7312d191e2c0a22f473be90dfcafd
-
SHA1
af68b58889a64f61993646e66242b1ef2f4a3582
-
SHA256
dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3
-
SHA512
aa2fcf25b6bbfefefca36e77731b3ed76448dd5e3c54f606dd17bf2d6a6383b9c4342dbb1a20b9f5f5a1882475e99919846f6a84378673a69c11f1afac910cc6
-
SSDEEP
384:N6wayA+1mwnA353BXR+oGfPmfm4MlcTGXdhjwroyY2rebV5O6KgxWb/83BXR+oGM:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 948 backup.exe 1112 backup.exe 468 backup.exe 668 backup.exe 876 System Restore.exe 296 backup.exe 292 backup.exe 1856 data.exe 1200 backup.exe 1704 backup.exe 1268 backup.exe 844 backup.exe 784 System Restore.exe 1032 backup.exe 1500 backup.exe 1504 backup.exe 1708 backup.exe 1292 backup.exe 1980 backup.exe 1148 backup.exe 980 backup.exe 1780 backup.exe 1368 backup.exe 2040 backup.exe 1612 backup.exe 1212 backup.exe 1420 backup.exe 848 System Restore.exe 828 backup.exe 1924 backup.exe 1384 backup.exe 1608 backup.exe 340 backup.exe 1952 backup.exe 268 backup.exe 1324 data.exe 996 backup.exe 1060 backup.exe 876 backup.exe 1692 backup.exe 1944 backup.exe 1732 backup.exe 1992 backup.exe 1088 backup.exe 1648 backup.exe 2024 backup.exe 1264 backup.exe 1844 backup.exe 1964 backup.exe 1776 backup.exe 784 backup.exe 796 backup.exe 1504 update.exe 1748 backup.exe 576 System Restore.exe 568 backup.exe 1112 backup.exe 760 backup.exe 812 backup.exe 1320 backup.exe 1804 backup.exe 1580 backup.exe 1560 backup.exe 996 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 1856 data.exe 1856 data.exe 1200 backup.exe 1200 backup.exe 1856 data.exe 1856 data.exe 1268 backup.exe 1268 backup.exe 844 backup.exe 844 backup.exe 1268 backup.exe 1268 backup.exe 1032 backup.exe 1032 backup.exe 1500 backup.exe 1500 backup.exe 1500 backup.exe 1500 backup.exe 1548 System Restore.exe 1548 System Restore.exe 1548 System Restore.exe 1548 System Restore.exe 1548 System Restore.exe 1548 System Restore.exe 1856 data.exe 1548 System Restore.exe 1268 backup.exe 1548 System Restore.exe 1856 data.exe 1268 backup.exe 1032 backup.exe 1032 backup.exe 1500 backup.exe 1500 backup.exe 1032 backup.exe 1500 backup.exe 1548 System Restore.exe 1856 data.exe 1032 backup.exe 1500 backup.exe 1548 System Restore.exe 1856 data.exe 1268 backup.exe 1268 backup.exe 980 backup.exe 980 backup.exe 1612 backup.exe 1612 backup.exe 1780 backup.exe 1780 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\data.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe System Restore.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\data.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Cursors\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\System Restore.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\Boot\data.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\backup.exe data.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 948 backup.exe 1112 backup.exe 468 backup.exe 668 backup.exe 876 System Restore.exe 296 backup.exe 292 backup.exe 1856 data.exe 1200 backup.exe 1704 backup.exe 1268 backup.exe 844 backup.exe 784 System Restore.exe 1032 backup.exe 1500 backup.exe 1504 backup.exe 1604 backup.exe 1600 backup.exe 1492 backup.exe 1476 backup.exe 1636 backup.exe 872 backup.exe 896 update.exe 888 backup.exe 616 data.exe 1692 backup.exe 540 backup.exe 1548 System Restore.exe 1292 backup.exe 1980 backup.exe 1148 backup.exe 980 backup.exe 1200 backup.exe 1368 backup.exe 1612 backup.exe 1780 backup.exe 2040 backup.exe 1420 backup.exe 828 backup.exe 1212 backup.exe 848 System Restore.exe 1924 backup.exe 1384 backup.exe 1608 backup.exe 340 backup.exe 1952 backup.exe 268 backup.exe 996 backup.exe 876 backup.exe 1692 backup.exe 1732 backup.exe 1060 backup.exe 1324 data.exe 1944 backup.exe 1088 backup.exe 1648 backup.exe 2024 backup.exe 1264 backup.exe 1992 backup.exe 1844 backup.exe 1964 backup.exe 784 backup.exe 1776 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 948 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 28 PID 1520 wrote to memory of 948 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 28 PID 1520 wrote to memory of 948 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 28 PID 1520 wrote to memory of 948 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 28 PID 1520 wrote to memory of 1112 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 29 PID 1520 wrote to memory of 1112 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 29 PID 1520 wrote to memory of 1112 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 29 PID 1520 wrote to memory of 1112 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 29 PID 1520 wrote to memory of 468 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 30 PID 1520 wrote to memory of 468 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 30 PID 1520 wrote to memory of 468 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 30 PID 1520 wrote to memory of 468 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 30 PID 1520 wrote to memory of 668 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 31 PID 1520 wrote to memory of 668 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 31 PID 1520 wrote to memory of 668 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 31 PID 1520 wrote to memory of 668 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 31 PID 1520 wrote to memory of 876 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 32 PID 1520 wrote to memory of 876 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 32 PID 1520 wrote to memory of 876 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 32 PID 1520 wrote to memory of 876 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 32 PID 1520 wrote to memory of 296 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 33 PID 1520 wrote to memory of 296 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 33 PID 1520 wrote to memory of 296 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 33 PID 1520 wrote to memory of 296 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 33 PID 1520 wrote to memory of 292 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 34 PID 1520 wrote to memory of 292 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 34 PID 1520 wrote to memory of 292 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 34 PID 1520 wrote to memory of 292 1520 dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe 34 PID 948 wrote to memory of 1856 948 backup.exe 35 PID 948 wrote to memory of 1856 948 backup.exe 35 PID 948 wrote to memory of 1856 948 backup.exe 35 PID 948 wrote to memory of 1856 948 backup.exe 35 PID 1856 wrote to memory of 1200 1856 data.exe 36 PID 1856 wrote to memory of 1200 1856 data.exe 36 PID 1856 wrote to memory of 1200 1856 data.exe 36 PID 1856 wrote to memory of 1200 1856 data.exe 36 PID 1200 wrote to memory of 1704 1200 backup.exe 37 PID 1200 wrote to memory of 1704 1200 backup.exe 37 PID 1200 wrote to memory of 1704 1200 backup.exe 37 PID 1200 wrote to memory of 1704 1200 backup.exe 37 PID 1856 wrote to memory of 1268 1856 data.exe 38 PID 1856 wrote to memory of 1268 1856 data.exe 38 PID 1856 wrote to memory of 1268 1856 data.exe 38 PID 1856 wrote to memory of 1268 1856 data.exe 38 PID 1268 wrote to memory of 844 1268 backup.exe 39 PID 1268 wrote to memory of 844 1268 backup.exe 39 PID 1268 wrote to memory of 844 1268 backup.exe 39 PID 1268 wrote to memory of 844 1268 backup.exe 39 PID 844 wrote to memory of 784 844 backup.exe 40 PID 844 wrote to memory of 784 844 backup.exe 40 PID 844 wrote to memory of 784 844 backup.exe 40 PID 844 wrote to memory of 784 844 backup.exe 40 PID 1268 wrote to memory of 1032 1268 backup.exe 41 PID 1268 wrote to memory of 1032 1268 backup.exe 41 PID 1268 wrote to memory of 1032 1268 backup.exe 41 PID 1268 wrote to memory of 1032 1268 backup.exe 41 PID 1032 wrote to memory of 1500 1032 backup.exe 42 PID 1032 wrote to memory of 1500 1032 backup.exe 42 PID 1032 wrote to memory of 1500 1032 backup.exe 42 PID 1032 wrote to memory of 1500 1032 backup.exe 42 PID 1500 wrote to memory of 1504 1500 backup.exe 43 PID 1500 wrote to memory of 1504 1500 backup.exe 43 PID 1500 wrote to memory of 1504 1500 backup.exe 43 PID 1500 wrote to memory of 1504 1500 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe"C:\Users\Admin\AppData\Local\Temp\dd81d0a8a2cc856eb0552bc0d4e72ab6ed92d9a7acd46e9be94a7091c05154f3.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\1359460541\backup.exeC:\Users\Admin\AppData\Local\Temp\1359460541\backup.exe C:\Users\Admin\AppData\Local\Temp\1359460541\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:948 -
C:\data.exe\data.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1856 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1200 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1704
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1268 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:844 -
C:\Program Files\7-Zip\Lang\System Restore.exe"C:\Program Files\7-Zip\Lang\System Restore.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:784
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1032 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1500 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1708 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1692
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:540
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1368
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:848
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:1476
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1200
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:1288
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:748
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:2200
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:2340
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1608
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:996
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1088
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Executes dropped EXE
PID:1320
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1768
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:828 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1944
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1776 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:676
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:292
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:2232
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:2300
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:920
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1356
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:868
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2208
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2040
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1420 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1732
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1060 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1028
-
-
C:\Program Files\Common Files\System\ado\en-US\System Restore.exe"C:\Program Files\Common Files\System\ado\en-US\System Restore.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1772
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:2240
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:2316
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
- System policy modification
PID:1560
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:808
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1896
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:2216
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2308
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1780 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:796
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1528
-
-
C:\Program Files\DVD Maker\fr-FR\data.exe"C:\Program Files\DVD Maker\fr-FR\data.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:828
-
-
C:\Program Files\DVD Maker\it-IT\update.exe"C:\Program Files\DVD Maker\it-IT\update.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:316
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:2224
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:2324
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1964 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
PID:568 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\update.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\update.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵PID:2284
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Executes dropped EXE
PID:1112
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Executes dropped EXE
PID:1804
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1816
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:296
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2260
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1692 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
PID:812
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:1580
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:752
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Executes dropped EXE
PID:760
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:540
-
-
C:\Program Files (x86)\Internet Explorer\data.exe"C:\Program Files (x86)\Internet Explorer\data.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:784
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft Office\data.exe"C:\Program Files (x86)\Microsoft Office\data.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2292
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1992
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:1748
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵
- Executes dropped EXE
PID:996
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:824
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1624
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:2268
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:848
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:340 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1264
-
-
C:\Windows\AppCompat\System Restore.exe"C:\Windows\AppCompat\System Restore.exe" C:\Windows\AppCompat\5⤵
- Executes dropped EXE
PID:576
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1744
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:2020
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1604
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2192
-
-
C:\Windows\Cursors\backup.exeC:\Windows\Cursors\backup.exe C:\Windows\Cursors\5⤵PID:2332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:468
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:668
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:296
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:292
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD504217d79609a7368a68af7b7ce948936
SHA12a7ea09e7ac36eb433aab10639287d73f85e10da
SHA2566b1298e7dacc9e603f559b1acbd7ce5291741a4e7786f1f6299f64801e4d3b15
SHA5128ac254ea907b4f47b40b207dc3d9dd82a5619c3bd1969b82618db1d4f90b568dd1ad367896b7337b6db4ea3fce65abdcfa441df92d35e6919f7ab4a16bc0c1bc
-
Filesize
72KB
MD5128d7e449a20c162722f460609d5de35
SHA16402fee7085384aaa88741a1db6a0fa44aa21379
SHA2568c36eebfd45a0b3dba25f11ba019c7a205e2a1a7b3891db809de999d7cb31a62
SHA51288a651f173e9dfdf3f7823518117854650f94ed831b11b55d8fcc83bc06cebb2b524d2c77959051a22ad6994e8d9b009a7536c60dcd39f944feded8dcd885932
-
Filesize
72KB
MD5128d7e449a20c162722f460609d5de35
SHA16402fee7085384aaa88741a1db6a0fa44aa21379
SHA2568c36eebfd45a0b3dba25f11ba019c7a205e2a1a7b3891db809de999d7cb31a62
SHA51288a651f173e9dfdf3f7823518117854650f94ed831b11b55d8fcc83bc06cebb2b524d2c77959051a22ad6994e8d9b009a7536c60dcd39f944feded8dcd885932
-
Filesize
72KB
MD53b5791884ee09d291b6a63461cfa61dc
SHA1b9e2f041a5f77f5b81c7877c2ab6b1c41fe9e499
SHA2567a5f4e8404fc586ebb9df7116da8d125612555a30a8260d7af45d7118254cf62
SHA51239202012da122468366e6f539267e0586c1e03cc710cb29d53da8227936055aec3d88a9ad41536548d25950b2fe93debc72b706b1b215778016805ce8c0c12f1
-
Filesize
72KB
MD50b2fe1bac6a3a85b6bb5b4a303eaa01b
SHA1f114866b1cc6c25c967b1e9d6af0550dcf68be26
SHA25644841aa1d4dfc4640489de2525363fc1288b9db689d2244e06efd1ee90d55344
SHA51285ffa96c135c26b5f448a6de3697f55fb22e7d4ff93e78e60aede5cb986a98ef1ef140ad8f9c2e8e2d8583d133ace38f81d7b99147c042fab73c148a901d9063
-
Filesize
72KB
MD50b2fe1bac6a3a85b6bb5b4a303eaa01b
SHA1f114866b1cc6c25c967b1e9d6af0550dcf68be26
SHA25644841aa1d4dfc4640489de2525363fc1288b9db689d2244e06efd1ee90d55344
SHA51285ffa96c135c26b5f448a6de3697f55fb22e7d4ff93e78e60aede5cb986a98ef1ef140ad8f9c2e8e2d8583d133ace38f81d7b99147c042fab73c148a901d9063
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5967892b6d99cc915b94d78a30d1ab967
SHA10dc64d13e0e6fa9ec9de8c6456534ddc5b78a050
SHA256d3cd23c5534a3cf59f6e0e99503acffe550f961ef2b1eebcba3c132a601d669b
SHA51231ce70a0d1a789e032663e7da25fd85c35563e7a0abddc9b12dbc4b248019f5d04f211647e70d85d66fc5f175ff1494031b7891193b4263adb60bf206c27c3dd
-
Filesize
72KB
MD5967892b6d99cc915b94d78a30d1ab967
SHA10dc64d13e0e6fa9ec9de8c6456534ddc5b78a050
SHA256d3cd23c5534a3cf59f6e0e99503acffe550f961ef2b1eebcba3c132a601d669b
SHA51231ce70a0d1a789e032663e7da25fd85c35563e7a0abddc9b12dbc4b248019f5d04f211647e70d85d66fc5f175ff1494031b7891193b4263adb60bf206c27c3dd
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5f8b17fdd24050c68cab406705f4fab15
SHA13cb00b44ee34d80a8c86a3734de009465c1d77ff
SHA2560bd0039b2d2fd7224878cb125fe9b0ed0fe3415fbba12503d181745fdbbc9f73
SHA51201e31dbff3ddf365c8ed94ea892f6717fb2683f9b4fb2af1c86179a13481e5ff7a733060d473d7e41bbac78314222e8d9a6c8012c794e841256e9368da7bbc45
-
Filesize
72KB
MD5f8b17fdd24050c68cab406705f4fab15
SHA13cb00b44ee34d80a8c86a3734de009465c1d77ff
SHA2560bd0039b2d2fd7224878cb125fe9b0ed0fe3415fbba12503d181745fdbbc9f73
SHA51201e31dbff3ddf365c8ed94ea892f6717fb2683f9b4fb2af1c86179a13481e5ff7a733060d473d7e41bbac78314222e8d9a6c8012c794e841256e9368da7bbc45
-
Filesize
72KB
MD5d37aeb07d2f0e794299505f9358369d0
SHA1220b2a48ef3191a3f3a7db0dda247e01677f1ed8
SHA256cf0e8b9f7c856d68525793abf952497d826b8f25041c6c63e8986cb86273e23e
SHA5129c7231d267f55d5ac9c3a78e01bba1b961c6071d456b133b07ad3e16545d7998b55d720e0fdc409f3518e8380572e2e6fcf6482e5f0d99a386b34830f23af3da
-
Filesize
72KB
MD5d37aeb07d2f0e794299505f9358369d0
SHA1220b2a48ef3191a3f3a7db0dda247e01677f1ed8
SHA256cf0e8b9f7c856d68525793abf952497d826b8f25041c6c63e8986cb86273e23e
SHA5129c7231d267f55d5ac9c3a78e01bba1b961c6071d456b133b07ad3e16545d7998b55d720e0fdc409f3518e8380572e2e6fcf6482e5f0d99a386b34830f23af3da
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725
-
Filesize
72KB
MD555b088b1d5a7a88195c874b7170907fb
SHA11e8242a18a285387ec4f6b60d4f639d045b24e51
SHA25682dab57441baa29a1cb60d4423a1e550cf3440dfb89a2efb750f94d3e4f7ce57
SHA512ae45b45d68591b10cd48dc101dccea24ad3bfb5b61d064ff50e68158233d6a960b2b368c41e57741899bda85b6581fca00262887878226f698f711cf5b3c0391
-
Filesize
72KB
MD555b088b1d5a7a88195c874b7170907fb
SHA11e8242a18a285387ec4f6b60d4f639d045b24e51
SHA25682dab57441baa29a1cb60d4423a1e550cf3440dfb89a2efb750f94d3e4f7ce57
SHA512ae45b45d68591b10cd48dc101dccea24ad3bfb5b61d064ff50e68158233d6a960b2b368c41e57741899bda85b6581fca00262887878226f698f711cf5b3c0391
-
Filesize
72KB
MD504217d79609a7368a68af7b7ce948936
SHA12a7ea09e7ac36eb433aab10639287d73f85e10da
SHA2566b1298e7dacc9e603f559b1acbd7ce5291741a4e7786f1f6299f64801e4d3b15
SHA5128ac254ea907b4f47b40b207dc3d9dd82a5619c3bd1969b82618db1d4f90b568dd1ad367896b7337b6db4ea3fce65abdcfa441df92d35e6919f7ab4a16bc0c1bc
-
Filesize
72KB
MD504217d79609a7368a68af7b7ce948936
SHA12a7ea09e7ac36eb433aab10639287d73f85e10da
SHA2566b1298e7dacc9e603f559b1acbd7ce5291741a4e7786f1f6299f64801e4d3b15
SHA5128ac254ea907b4f47b40b207dc3d9dd82a5619c3bd1969b82618db1d4f90b568dd1ad367896b7337b6db4ea3fce65abdcfa441df92d35e6919f7ab4a16bc0c1bc
-
Filesize
72KB
MD5128d7e449a20c162722f460609d5de35
SHA16402fee7085384aaa88741a1db6a0fa44aa21379
SHA2568c36eebfd45a0b3dba25f11ba019c7a205e2a1a7b3891db809de999d7cb31a62
SHA51288a651f173e9dfdf3f7823518117854650f94ed831b11b55d8fcc83bc06cebb2b524d2c77959051a22ad6994e8d9b009a7536c60dcd39f944feded8dcd885932
-
Filesize
72KB
MD5128d7e449a20c162722f460609d5de35
SHA16402fee7085384aaa88741a1db6a0fa44aa21379
SHA2568c36eebfd45a0b3dba25f11ba019c7a205e2a1a7b3891db809de999d7cb31a62
SHA51288a651f173e9dfdf3f7823518117854650f94ed831b11b55d8fcc83bc06cebb2b524d2c77959051a22ad6994e8d9b009a7536c60dcd39f944feded8dcd885932
-
Filesize
72KB
MD53b5791884ee09d291b6a63461cfa61dc
SHA1b9e2f041a5f77f5b81c7877c2ab6b1c41fe9e499
SHA2567a5f4e8404fc586ebb9df7116da8d125612555a30a8260d7af45d7118254cf62
SHA51239202012da122468366e6f539267e0586c1e03cc710cb29d53da8227936055aec3d88a9ad41536548d25950b2fe93debc72b706b1b215778016805ce8c0c12f1
-
Filesize
72KB
MD53b5791884ee09d291b6a63461cfa61dc
SHA1b9e2f041a5f77f5b81c7877c2ab6b1c41fe9e499
SHA2567a5f4e8404fc586ebb9df7116da8d125612555a30a8260d7af45d7118254cf62
SHA51239202012da122468366e6f539267e0586c1e03cc710cb29d53da8227936055aec3d88a9ad41536548d25950b2fe93debc72b706b1b215778016805ce8c0c12f1
-
Filesize
72KB
MD50b2fe1bac6a3a85b6bb5b4a303eaa01b
SHA1f114866b1cc6c25c967b1e9d6af0550dcf68be26
SHA25644841aa1d4dfc4640489de2525363fc1288b9db689d2244e06efd1ee90d55344
SHA51285ffa96c135c26b5f448a6de3697f55fb22e7d4ff93e78e60aede5cb986a98ef1ef140ad8f9c2e8e2d8583d133ace38f81d7b99147c042fab73c148a901d9063
-
Filesize
72KB
MD50b2fe1bac6a3a85b6bb5b4a303eaa01b
SHA1f114866b1cc6c25c967b1e9d6af0550dcf68be26
SHA25644841aa1d4dfc4640489de2525363fc1288b9db689d2244e06efd1ee90d55344
SHA51285ffa96c135c26b5f448a6de3697f55fb22e7d4ff93e78e60aede5cb986a98ef1ef140ad8f9c2e8e2d8583d133ace38f81d7b99147c042fab73c148a901d9063
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5967892b6d99cc915b94d78a30d1ab967
SHA10dc64d13e0e6fa9ec9de8c6456534ddc5b78a050
SHA256d3cd23c5534a3cf59f6e0e99503acffe550f961ef2b1eebcba3c132a601d669b
SHA51231ce70a0d1a789e032663e7da25fd85c35563e7a0abddc9b12dbc4b248019f5d04f211647e70d85d66fc5f175ff1494031b7891193b4263adb60bf206c27c3dd
-
Filesize
72KB
MD5967892b6d99cc915b94d78a30d1ab967
SHA10dc64d13e0e6fa9ec9de8c6456534ddc5b78a050
SHA256d3cd23c5534a3cf59f6e0e99503acffe550f961ef2b1eebcba3c132a601d669b
SHA51231ce70a0d1a789e032663e7da25fd85c35563e7a0abddc9b12dbc4b248019f5d04f211647e70d85d66fc5f175ff1494031b7891193b4263adb60bf206c27c3dd
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5d9ea0026dae3cbec26e1b61fca0958a2
SHA1482e01eff4360a3c99abaefc19c727b3e748a2c6
SHA256cd03532df23e10673a2a98780c5611453ddf26857f1b959d616edfe864baf676
SHA512fafea8cc53418b412dd66d807aae03df0e61295fe156006003c2d98eb735f368458548ee2032ac1f72f1a3b58e006699434af56cbce995b3a03d9170cd80d8b0
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5363a826f25528ccf1e3b52cc326abbab
SHA1d0b6edea47f3d921cd73f177943d2b44a77ae6b2
SHA25681a675784f0d0bc5efc7c8a3ce08c9b5ed7714b1d3117079e7228195f5f3269c
SHA5121f4acdf85f40e64a2b63bf38f5d467a48266a8eb842770094b198eab44e6f248d2aee7a153731ff0f622d4419c631e5ccaefbd5ecf942d6d6c28a4b95120cf51
-
Filesize
72KB
MD5f8b17fdd24050c68cab406705f4fab15
SHA13cb00b44ee34d80a8c86a3734de009465c1d77ff
SHA2560bd0039b2d2fd7224878cb125fe9b0ed0fe3415fbba12503d181745fdbbc9f73
SHA51201e31dbff3ddf365c8ed94ea892f6717fb2683f9b4fb2af1c86179a13481e5ff7a733060d473d7e41bbac78314222e8d9a6c8012c794e841256e9368da7bbc45
-
Filesize
72KB
MD5f8b17fdd24050c68cab406705f4fab15
SHA13cb00b44ee34d80a8c86a3734de009465c1d77ff
SHA2560bd0039b2d2fd7224878cb125fe9b0ed0fe3415fbba12503d181745fdbbc9f73
SHA51201e31dbff3ddf365c8ed94ea892f6717fb2683f9b4fb2af1c86179a13481e5ff7a733060d473d7e41bbac78314222e8d9a6c8012c794e841256e9368da7bbc45
-
Filesize
72KB
MD5d37aeb07d2f0e794299505f9358369d0
SHA1220b2a48ef3191a3f3a7db0dda247e01677f1ed8
SHA256cf0e8b9f7c856d68525793abf952497d826b8f25041c6c63e8986cb86273e23e
SHA5129c7231d267f55d5ac9c3a78e01bba1b961c6071d456b133b07ad3e16545d7998b55d720e0fdc409f3518e8380572e2e6fcf6482e5f0d99a386b34830f23af3da
-
Filesize
72KB
MD5d37aeb07d2f0e794299505f9358369d0
SHA1220b2a48ef3191a3f3a7db0dda247e01677f1ed8
SHA256cf0e8b9f7c856d68525793abf952497d826b8f25041c6c63e8986cb86273e23e
SHA5129c7231d267f55d5ac9c3a78e01bba1b961c6071d456b133b07ad3e16545d7998b55d720e0fdc409f3518e8380572e2e6fcf6482e5f0d99a386b34830f23af3da
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\System Restore.exe
Filesize72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD50d98eba360b5f28c642bb05500078291
SHA1dd3dc51037efa9cb448cb920d8039c9b5c0db4e2
SHA256838be9b2a6bf4dd46691d936696a3ae2b186b24d08c09d0d39847c5efb20f8f1
SHA512477791dac96661e8af4475efc02c767e9a6add21e0dac3311f18a1a06a5fcdc031220cc12431b725c9a86cc0d4c9fabcdd0703e60d39a3487bf0b3948c71cf49
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725
-
Filesize
72KB
MD539499f10a964568190f7fb8cc661fe9b
SHA1cff37e26c35806d5113c114a909a955fa31bceba
SHA2569aca882047cd6aba06b84eeb96fa08e35d6c53c85d4a4b97e245a378b37abcfa
SHA51253d575746e9dce381924ed522c9f612eb12ab582431d06befb12fc1cc7532760f8831e8e0564a6adad3c170c89ea74b13e0dec2004597893069071aef9608725