Analysis
-
max time kernel
189s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe
Resource
win10v2004-20221111-en
General
-
Target
3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe
-
Size
72KB
-
MD5
1ad9079b40c4b984d1884d0188337231
-
SHA1
80bf4ad25ae9073a3fb6c787c6eeedd379f43a1d
-
SHA256
3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7
-
SHA512
1f1ade0285faa09853eadf0edb6a31e49930221a2ea56a6cbfbe373f6947dd7959190b5656934678fedf12ad28da2bfef96bca54a2901b3da8da216df8d694ec
-
SSDEEP
384:N6wayA+1mwnA353BXR+oGfPmfm4MlcTGXdhjwroyY2rebV5O6KgxWb/83BXR+oGJ:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRr0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1316 backup.exe 1000 data.exe 1356 backup.exe 1348 backup.exe 1820 backup.exe 1496 backup.exe 1616 backup.exe 1220 data.exe 1804 backup.exe 844 backup.exe 1040 backup.exe 2004 System Restore.exe 436 backup.exe 1972 System Restore.exe 1760 backup.exe 1524 backup.exe 912 data.exe 1776 backup.exe 1708 backup.exe 1688 backup.exe 1544 backup.exe 1052 backup.exe 292 backup.exe 1500 backup.exe 1068 backup.exe 612 backup.exe 1164 backup.exe 840 backup.exe 1636 backup.exe 1804 backup.exe 1404 backup.exe 1948 backup.exe 436 backup.exe 1488 backup.exe 956 backup.exe 2024 backup.exe 1484 backup.exe 588 backup.exe 1160 backup.exe 1924 backup.exe 864 backup.exe 1800 backup.exe 576 System Restore.exe 1444 backup.exe 1680 backup.exe 1544 backup.exe 1616 update.exe 556 backup.exe 844 backup.exe 872 backup.exe 1380 backup.exe 1052 System Restore.exe 840 backup.exe 1936 backup.exe 1320 backup.exe 1660 backup.exe 876 backup.exe 1804 backup.exe 1684 backup.exe 596 backup.exe 1348 backup.exe 1304 backup.exe 1632 backup.exe 1200 data.exe -
Loads dropped DLL 64 IoCs
pid Process 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1220 data.exe 1220 data.exe 1804 backup.exe 1804 backup.exe 1220 data.exe 1220 data.exe 1040 backup.exe 1040 backup.exe 2004 System Restore.exe 2004 System Restore.exe 1040 backup.exe 1040 backup.exe 1972 System Restore.exe 1972 System Restore.exe 1760 backup.exe 1760 backup.exe 1760 backup.exe 1760 backup.exe 1220 data.exe 1760 backup.exe 1760 backup.exe 1220 data.exe 1040 backup.exe 1040 backup.exe 1972 System Restore.exe 1708 backup.exe 1688 backup.exe 1972 System Restore.exe 1776 backup.exe 1776 backup.exe 1708 backup.exe 1688 backup.exe 1972 System Restore.exe 292 backup.exe 292 backup.exe 1972 System Restore.exe 1688 backup.exe 1688 backup.exe 1776 backup.exe 1776 backup.exe 1068 backup.exe 612 backup.exe 1068 backup.exe 612 backup.exe 1688 backup.exe 1776 backup.exe 1688 backup.exe 1776 backup.exe 1688 backup.exe 1688 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe data.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe update.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe update.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft SQL Server Compact Edition\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files\Reference Assemblies\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\MSBuild\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\Chess\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\Branding\Basebrd\de-DE\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\Custom64\backup.exe backup.exe File opened for modification C:\Windows\Branding\ShellBrd\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC_64\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\Microsoft.Ink\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\Custom\backup.exe backup.exe File opened for modification C:\Windows\Cursors\backup.exe backup.exe File opened for modification C:\Windows\Branding\Basebrd\en-US\update.exe backup.exe File opened for modification C:\Windows\backup.exe data.exe File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\Extensibility\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC_MSIL\data.exe backup.exe File opened for modification C:\Windows\assembly\GAC\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\ADODB\backup.exe backup.exe File opened for modification C:\Windows\Branding\Basebrd\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\de-DE\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\en-US\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\GAC_32\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\es-ES\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 1316 backup.exe 1000 data.exe 1356 backup.exe 1348 backup.exe 1820 backup.exe 1496 backup.exe 1616 backup.exe 1220 data.exe 1804 backup.exe 844 backup.exe 1040 backup.exe 2004 System Restore.exe 436 backup.exe 1972 System Restore.exe 1760 backup.exe 1524 backup.exe 776 backup.exe 1924 data.exe 524 System Restore.exe 1776 backup.exe 1708 backup.exe 1688 backup.exe 1544 backup.exe 292 backup.exe 1052 backup.exe 1500 backup.exe 1068 backup.exe 1164 backup.exe 840 backup.exe 612 backup.exe 1948 backup.exe 1404 backup.exe 1636 backup.exe 1804 backup.exe 1740 update.exe 436 backup.exe 1488 backup.exe 1304 backup.exe 1484 backup.exe 956 backup.exe 2024 backup.exe 588 backup.exe 1924 backup.exe 1160 backup.exe 864 backup.exe 576 System Restore.exe 1800 backup.exe 2020 backup.exe 1444 backup.exe 1680 backup.exe 1544 backup.exe 1616 update.exe 556 backup.exe 844 backup.exe 1976 backup.exe 872 backup.exe 840 backup.exe 1380 backup.exe 1660 backup.exe 1936 backup.exe 1320 backup.exe 1052 System Restore.exe 876 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1116 wrote to memory of 1316 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 28 PID 1116 wrote to memory of 1316 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 28 PID 1116 wrote to memory of 1316 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 28 PID 1116 wrote to memory of 1316 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 28 PID 1116 wrote to memory of 1000 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 29 PID 1116 wrote to memory of 1000 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 29 PID 1116 wrote to memory of 1000 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 29 PID 1116 wrote to memory of 1000 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 29 PID 1116 wrote to memory of 1356 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 30 PID 1116 wrote to memory of 1356 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 30 PID 1116 wrote to memory of 1356 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 30 PID 1116 wrote to memory of 1356 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 30 PID 1116 wrote to memory of 1348 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 31 PID 1116 wrote to memory of 1348 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 31 PID 1116 wrote to memory of 1348 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 31 PID 1116 wrote to memory of 1348 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 31 PID 1116 wrote to memory of 1820 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 32 PID 1116 wrote to memory of 1820 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 32 PID 1116 wrote to memory of 1820 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 32 PID 1116 wrote to memory of 1820 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 32 PID 1116 wrote to memory of 1496 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 33 PID 1116 wrote to memory of 1496 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 33 PID 1116 wrote to memory of 1496 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 33 PID 1116 wrote to memory of 1496 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 33 PID 1116 wrote to memory of 1616 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 34 PID 1116 wrote to memory of 1616 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 34 PID 1116 wrote to memory of 1616 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 34 PID 1116 wrote to memory of 1616 1116 3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe 34 PID 1316 wrote to memory of 1220 1316 backup.exe 35 PID 1316 wrote to memory of 1220 1316 backup.exe 35 PID 1316 wrote to memory of 1220 1316 backup.exe 35 PID 1316 wrote to memory of 1220 1316 backup.exe 35 PID 1220 wrote to memory of 1804 1220 data.exe 36 PID 1220 wrote to memory of 1804 1220 data.exe 36 PID 1220 wrote to memory of 1804 1220 data.exe 36 PID 1220 wrote to memory of 1804 1220 data.exe 36 PID 1804 wrote to memory of 844 1804 backup.exe 37 PID 1804 wrote to memory of 844 1804 backup.exe 37 PID 1804 wrote to memory of 844 1804 backup.exe 37 PID 1804 wrote to memory of 844 1804 backup.exe 37 PID 1220 wrote to memory of 1040 1220 data.exe 38 PID 1220 wrote to memory of 1040 1220 data.exe 38 PID 1220 wrote to memory of 1040 1220 data.exe 38 PID 1220 wrote to memory of 1040 1220 data.exe 38 PID 1040 wrote to memory of 2004 1040 backup.exe 39 PID 1040 wrote to memory of 2004 1040 backup.exe 39 PID 1040 wrote to memory of 2004 1040 backup.exe 39 PID 1040 wrote to memory of 2004 1040 backup.exe 39 PID 2004 wrote to memory of 436 2004 System Restore.exe 40 PID 2004 wrote to memory of 436 2004 System Restore.exe 40 PID 2004 wrote to memory of 436 2004 System Restore.exe 40 PID 2004 wrote to memory of 436 2004 System Restore.exe 40 PID 1040 wrote to memory of 1972 1040 backup.exe 41 PID 1040 wrote to memory of 1972 1040 backup.exe 41 PID 1040 wrote to memory of 1972 1040 backup.exe 41 PID 1040 wrote to memory of 1972 1040 backup.exe 41 PID 1972 wrote to memory of 1760 1972 System Restore.exe 42 PID 1972 wrote to memory of 1760 1972 System Restore.exe 42 PID 1972 wrote to memory of 1760 1972 System Restore.exe 42 PID 1972 wrote to memory of 1760 1972 System Restore.exe 42 PID 1760 wrote to memory of 1524 1760 backup.exe 43 PID 1760 wrote to memory of 1524 1760 backup.exe 43 PID 1760 wrote to memory of 1524 1760 backup.exe 43 PID 1760 wrote to memory of 1524 1760 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe"C:\Users\Admin\AppData\Local\Temp\3433e0288fe15f7b5526a2970d607a4ad86822936426c50a056aedda210ed7c7.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3075666406\backup.exeC:\Users\Admin\AppData\Local\Temp\3075666406\backup.exe C:\Users\Admin\AppData\Local\Temp\3075666406\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\data.exe\data.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1804 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1040 -
C:\Program Files\7-Zip\System Restore.exe"C:\Program Files\7-Zip\System Restore.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436
-
-
-
C:\Program Files\Common Files\System Restore.exe"C:\Program Files\Common Files\System Restore.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1760 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
PID:912 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Suspicious use of SetWindowsHookEx
PID:776
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:524
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Suspicious use of SetWindowsHookEx
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵PID:1996
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵PID:1984
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
PID:836
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1792
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵PID:2092
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵PID:2912
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵PID:1996
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵PID:2620
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵PID:2284
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵PID:2400
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:2688
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1052
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1488
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1052
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- System policy modification
PID:1348
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
PID:1844
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Drops file in Program Files directory
- System policy modification
PID:872 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:2076
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:1936
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:2408
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\data.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\data.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:2700
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Drops file in Program Files directory
PID:1740 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵
- System policy modification
PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵PID:2540
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\8⤵PID:2272
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\8⤵PID:2392
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\8⤵PID:2972
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
PID:376
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵
- Modifies visibility of file extensions in Explorer
PID:2156
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2632
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:612 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2024 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:840
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:1800
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:984
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:960
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1736
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵PID:2224
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- Executes dropped EXE
PID:1684
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1164
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:676
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵
- Modifies visibility of file extensions in Explorer
PID:708
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:640
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2172
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵
- Drops file in Program Files directory
PID:2556 -
C:\Program Files\Common Files\System\msadc\de-DE\backup.exe"C:\Program Files\Common Files\System\msadc\de-DE\backup.exe" C:\Program Files\Common Files\System\msadc\de-DE\8⤵PID:2232
-
-
C:\Program Files\Common Files\System\msadc\en-US\backup.exe"C:\Program Files\Common Files\System\msadc\en-US\backup.exe" C:\Program Files\Common Files\System\msadc\en-US\8⤵PID:2536
-
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:2044
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1688 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956
-
-
C:\Program Files\DVD Maker\ja-JP\System Restore.exe"C:\Program Files\DVD Maker\ja-JP\System Restore.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:576
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:556 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:1304 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
PID:1404
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:2012
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵
- System policy modification
PID:812
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵
- Modifies visibility of file extensions in Explorer
PID:1868
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵
- Modifies visibility of file extensions in Explorer
PID:2124
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵PID:2948
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵PID:1540
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1380 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵PID:1644
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:772
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\default_apps\9⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\9⤵PID:2116
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\9⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\9⤵PID:676
-
-
-
C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe"C:\Program Files\Google\Chrome\Application\Dictionaries\backup.exe" C:\Program Files\Google\Chrome\Application\Dictionaries\8⤵
- Modifies visibility of file extensions in Explorer
PID:2044
-
-
C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe"C:\Program Files\Google\Chrome\Application\SetupMetrics\backup.exe" C:\Program Files\Google\Chrome\Application\SetupMetrics\8⤵
- Modifies visibility of file extensions in Explorer
PID:964
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:1804 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- System policy modification
PID:1504
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:1176
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1572
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:1936
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵
- System policy modification
PID:2060
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2592
-
-
C:\Program Files\Internet Explorer\ja-JP\System Restore.exe"C:\Program Files\Internet Explorer\ja-JP\System Restore.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:1712
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:1600
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
- System policy modification
PID:1532 -
C:\Program Files\Java\jdk1.7.0_80\backup.exe"C:\Program Files\Java\jdk1.7.0_80\backup.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵
- Drops file in Program Files directory
PID:1648 -
C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe"C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2496
-
-
C:\Program Files\Java\jdk1.7.0_80\db\update.exe"C:\Program Files\Java\jdk1.7.0_80\db\update.exe" C:\Program Files\Java\jdk1.7.0_80\db\7⤵PID:2212
-
-
C:\Program Files\Java\jdk1.7.0_80\include\backup.exe"C:\Program Files\Java\jdk1.7.0_80\include\backup.exe" C:\Program Files\Java\jdk1.7.0_80\include\7⤵PID:2504
-
-
C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe"C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe" C:\Program Files\Java\jdk1.7.0_80\jre\7⤵PID:2988
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:2256
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Drops file in Program Files directory
PID:1500 -
C:\Program Files\Microsoft Games\Chess\backup.exe"C:\Program Files\Microsoft Games\Chess\backup.exe" C:\Program Files\Microsoft Games\Chess\6⤵
- Drops file in Program Files directory
- System policy modification
PID:692 -
C:\Program Files\Microsoft Games\Chess\de-DE\backup.exe"C:\Program Files\Microsoft Games\Chess\de-DE\backup.exe" C:\Program Files\Microsoft Games\Chess\de-DE\7⤵PID:2488
-
-
C:\Program Files\Microsoft Games\Chess\en-US\backup.exe"C:\Program Files\Microsoft Games\Chess\en-US\backup.exe" C:\Program Files\Microsoft Games\Chess\en-US\7⤵PID:588
-
-
C:\Program Files\Microsoft Games\Chess\es-ES\backup.exe"C:\Program Files\Microsoft Games\Chess\es-ES\backup.exe" C:\Program Files\Microsoft Games\Chess\es-ES\7⤵PID:2456
-
-
C:\Program Files\Microsoft Games\Chess\fr-FR\backup.exe"C:\Program Files\Microsoft Games\Chess\fr-FR\backup.exe" C:\Program Files\Microsoft Games\Chess\fr-FR\7⤵PID:2160
-
-
-
C:\Program Files\Microsoft Games\FreeCell\backup.exe"C:\Program Files\Microsoft Games\FreeCell\backup.exe" C:\Program Files\Microsoft Games\FreeCell\6⤵PID:2260
-
C:\Program Files\Microsoft Games\FreeCell\de-DE\update.exe"C:\Program Files\Microsoft Games\FreeCell\de-DE\update.exe" C:\Program Files\Microsoft Games\FreeCell\de-DE\7⤵PID:2116
-
-
-
C:\Program Files\Microsoft Games\Hearts\backup.exe"C:\Program Files\Microsoft Games\Hearts\backup.exe" C:\Program Files\Microsoft Games\Hearts\6⤵PID:1876
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2312 -
C:\Program Files\Microsoft Office\Office14\backup.exe"C:\Program Files\Microsoft Office\Office14\backup.exe" C:\Program Files\Microsoft Office\Office14\6⤵PID:2992
-
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:708
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2740
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:2224
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1708 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:292 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- System policy modification
PID:1816
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Drops file in Program Files directory
PID:1632 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- System policy modification
PID:2068
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- System policy modification
PID:1600
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2164 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:2468
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:2208
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1068
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:2060
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:844 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1200 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵
- Modifies visibility of file extensions in Explorer
PID:1636
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵
- System policy modification
PID:1624
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵
- Drops file in Program Files directory
- System policy modification
PID:1488 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\9⤵PID:2108
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\9⤵
- Drops file in Program Files directory
- System policy modification
PID:2600 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\10⤵PID:2980
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:2336
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:3016
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\9⤵PID:2072
-
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2032
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\8⤵
- Modifies visibility of file extensions in Explorer
PID:1068
-
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1320 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1632
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵
- Modifies visibility of file extensions in Explorer
PID:692 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\8⤵PID:1932
-
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9⤵
- Drops file in Program Files directory
- System policy modification
PID:1628 -
C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Help\en_US\Adobe Reader\9.0\10⤵PID:2460
-
-
-
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵
- System policy modification
PID:588
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1616 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\update.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\update.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵
- Drops file in Program Files directory
PID:1944 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\8⤵
- Modifies visibility of file extensions in Explorer
PID:2528
-
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵
- System policy modification
PID:864
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵
- Drops file in Program Files directory
PID:2100 -
C:\Program Files (x86)\Common Files\microsoft shared\DAO\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\DAO\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\DAO\7⤵PID:2640
-
-
C:\Program Files (x86)\Common Files\microsoft shared\DW\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\DW\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\DW\7⤵PID:2240
-
-
C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\EQUATION\7⤵PID:2424
-
-
C:\Program Files (x86)\Common Files\microsoft shared\EURO\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\EURO\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\EURO\7⤵PID:2748
-
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:2356
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2624
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Drops file in Program Files directory
PID:1844 -
C:\Program Files (x86)\Google\CrashReports\update.exe"C:\Program Files (x86)\Google\CrashReports\update.exe" C:\Program Files (x86)\Google\CrashReports\6⤵
- System policy modification
PID:1296
-
-
C:\Program Files (x86)\Google\Policies\backup.exe"C:\Program Files (x86)\Google\Policies\backup.exe" C:\Program Files (x86)\Google\Policies\6⤵PID:2648
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:960
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:2416
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:904
-
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:2052
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:2436
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\System Restore.exe"C:\Program Files (x86)\Internet Explorer\es-ES\System Restore.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:1980
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\data.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\data.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:1560
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\update.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\update.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2112
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:864 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1680 -
C:\Users\Admin\Contacts\update.exeC:\Users\Admin\Contacts\update.exe C:\Users\Admin\Contacts\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1660
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:1092
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1772
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1380
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵
- Modifies visibility of file extensions in Explorer
PID:1636
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:2148
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:2584
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵
- System policy modification
PID:2196
-
-
C:\Users\Admin\Searches\update.exeC:\Users\Admin\Searches\update.exe C:\Users\Admin\Searches\6⤵PID:2032
-
-
C:\Users\Admin\Videos\backup.exeC:\Users\Admin\Videos\backup.exe C:\Users\Admin\Videos\6⤵PID:2152
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Executes dropped EXE
- System policy modification
PID:596 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- Modifies visibility of file extensions in Explorer
PID:1532
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:812
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵PID:524
-
C:\Users\Public\Music\Sample Music\backup.exe"C:\Users\Public\Music\Sample Music\backup.exe" C:\Users\Public\Music\Sample Music\7⤵PID:1000
-
-
-
C:\Users\Public\Pictures\backup.exeC:\Users\Public\Pictures\backup.exe C:\Users\Public\Pictures\6⤵PID:1728
-
C:\Users\Public\Pictures\Sample Pictures\backup.exe"C:\Users\Public\Pictures\Sample Pictures\backup.exe" C:\Users\Public\Pictures\Sample Pictures\7⤵PID:292
-
-
-
C:\Users\Public\Recorded TV\backup.exe"C:\Users\Public\Recorded TV\backup.exe" C:\Users\Public\Recorded TV\6⤵PID:1876
-
C:\Users\Public\Recorded TV\Sample Media\backup.exe"C:\Users\Public\Recorded TV\Sample Media\backup.exe" C:\Users\Public\Recorded TV\Sample Media\7⤵
- Modifies visibility of file extensions in Explorer
PID:1560
-
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵
- Modifies visibility of file extensions in Explorer
PID:2296 -
C:\Users\Public\Videos\Sample Videos\backup.exe"C:\Users\Public\Videos\Sample Videos\backup.exe" C:\Users\Public\Videos\Sample Videos\7⤵PID:2964
-
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
PID:1412
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1592
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Drops file in Windows directory
PID:1720 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵
- Modifies visibility of file extensions in Explorer
PID:984
-
-
C:\Windows\AppPatch\Custom\backup.exeC:\Windows\AppPatch\Custom\backup.exe C:\Windows\AppPatch\Custom\6⤵
- Drops file in Windows directory
PID:2564 -
C:\Windows\AppPatch\Custom\Custom64\backup.exeC:\Windows\AppPatch\Custom\Custom64\backup.exe C:\Windows\AppPatch\Custom\Custom64\7⤵PID:1572
-
-
-
C:\Windows\AppPatch\de-DE\backup.exeC:\Windows\AppPatch\de-DE\backup.exe C:\Windows\AppPatch\de-DE\6⤵PID:2244
-
-
C:\Windows\AppPatch\en-US\backup.exeC:\Windows\AppPatch\en-US\backup.exe C:\Windows\AppPatch\en-US\6⤵PID:2432
-
-
C:\Windows\AppPatch\es-ES\backup.exeC:\Windows\AppPatch\es-ES\backup.exe C:\Windows\AppPatch\es-ES\6⤵PID:2176
-
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:1260 -
C:\Windows\assembly\GAC\backup.exeC:\Windows\assembly\GAC\backup.exe C:\Windows\assembly\GAC\6⤵
- Drops file in Windows directory
PID:2084 -
C:\Windows\assembly\GAC\ADODB\backup.exeC:\Windows\assembly\GAC\ADODB\backup.exe C:\Windows\assembly\GAC\ADODB\7⤵
- Drops file in Windows directory
- System policy modification
PID:2480 -
C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exeC:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\backup.exe C:\Windows\assembly\GAC\ADODB\7.0.3300.0__b03f5f7f11d50a3a\8⤵PID:2200
-
-
-
C:\Windows\assembly\GAC\Extensibility\backup.exeC:\Windows\assembly\GAC\Extensibility\backup.exe C:\Windows\assembly\GAC\Extensibility\7⤵PID:1624
-
-
C:\Windows\assembly\GAC\Microsoft.Ink\backup.exeC:\Windows\assembly\GAC\Microsoft.Ink\backup.exe C:\Windows\assembly\GAC\Microsoft.Ink\7⤵PID:2520
-
-
-
C:\Windows\assembly\GAC_32\backup.exeC:\Windows\assembly\GAC_32\backup.exe C:\Windows\assembly\GAC_32\6⤵PID:2140
-
-
C:\Windows\assembly\GAC_64\backup.exeC:\Windows\assembly\GAC_64\backup.exe C:\Windows\assembly\GAC_64\6⤵PID:2448
-
-
C:\Windows\assembly\GAC_MSIL\data.exeC:\Windows\assembly\GAC_MSIL\data.exe C:\Windows\assembly\GAC_MSIL\6⤵PID:2724
-
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Windows directory
- System policy modification
PID:2304 -
C:\Windows\Branding\Basebrd\backup.exeC:\Windows\Branding\Basebrd\backup.exe C:\Windows\Branding\Basebrd\6⤵
- Drops file in Windows directory
PID:2576 -
C:\Windows\Branding\Basebrd\de-DE\backup.exeC:\Windows\Branding\Basebrd\de-DE\backup.exe C:\Windows\Branding\Basebrd\de-DE\7⤵PID:2348
-
-
C:\Windows\Branding\Basebrd\en-US\update.exeC:\Windows\Branding\Basebrd\en-US\update.exe C:\Windows\Branding\Basebrd\en-US\7⤵PID:2656
-
-
-
C:\Windows\Branding\ShellBrd\backup.exeC:\Windows\Branding\ShellBrd\backup.exe C:\Windows\Branding\ShellBrd\6⤵PID:1176
-
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2184
-
-
C:\Windows\Cursors\backup.exeC:\Windows\Cursors\backup.exe C:\Windows\Cursors\5⤵PID:2052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\data.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\data.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD56686a6363b4fabe900372b7b0c2a5b30
SHA1bebc1c2772ff24715c1afbe3323b15b5e3c0cca1
SHA256a98ae0e4325a066fad0632ad5dc5d7423dfc338930ebb5d25cd865072c2cb918
SHA512b0e3f75ee3996b70bb70bb385071f2c4d020e02f76919df6cdc512ea2eee8162ea66c2da1f229095d9c136a03de5c6e01baf4ccf0195ac9b861c65ea77aea2a8
-
Filesize
72KB
MD554c004d61be0b6219b8ec614669e24e3
SHA15a09728ffd69c484a544a8b8480b06779cca4ee8
SHA256bffef7d85250276bef5f9b5b91740c7e97d26c36e65ef2d86254720d8f1e1e79
SHA512ab7e91de97babf69f3da8eb88d8741b053adf59d6b0f70c9a7e3ebbc16c18b987cd56d35829203dab322d805c6390edc1acc041fd167f3b1bca0be47a08925e9
-
Filesize
72KB
MD554c004d61be0b6219b8ec614669e24e3
SHA15a09728ffd69c484a544a8b8480b06779cca4ee8
SHA256bffef7d85250276bef5f9b5b91740c7e97d26c36e65ef2d86254720d8f1e1e79
SHA512ab7e91de97babf69f3da8eb88d8741b053adf59d6b0f70c9a7e3ebbc16c18b987cd56d35829203dab322d805c6390edc1acc041fd167f3b1bca0be47a08925e9
-
Filesize
72KB
MD54603b3ad9eacd51c43ac294b666b7c3d
SHA1d33d05f20a697c099dafed0664c901eb29fcd982
SHA25632ca3050951f896ebd7ac4b12165ecb9d351c0bb34b5f74cba7f235eb9fb56a5
SHA512cd2014bcf821fb7033cc04f0ce62f9e2c57c82c807edf4f1dcece19cee1f4a0d2c2865cf035a0913363c9915fb5a9148ea442bd85a9bf2ca452cd9698cfc5021
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5c5d23c3ce54df0ba37f8854df3e8f427
SHA1c82a37fd16aacd232c2e4b838ea4de550c3d8174
SHA256c6aa742720f9fbf1c31b6c3f3b176a707f6d0d93bd0d10da1a2ba8a905c925a0
SHA5127ab1f058525407e7a3a90a587711bf80471ff30e47b909109ef10b9233656ca181482fa7e055fd80fbe1e557f40d96bc0a66356a2e1d0a90d37c70e9e93c3d26
-
Filesize
72KB
MD59d26df4b287246ad003d0b9d0967fbc7
SHA16121bcb49daf9ef457aaab533796eec160e5e549
SHA256c9ca9bd7b26c20b94141be7dbfea29703fda5ec6d5cda52d56270a1020c50908
SHA512874ab411983a7cf36a8e1cf783c2aeaeae04cf6bc5393b89edf6c0a508220740531ccb05c5acf12d94d75fc308d09b2707ba2f7fef6a8b212d4721ee6ca2061a
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD5dd48db42d844203eb3ac5a7b61eed1fc
SHA105dc0731e740e43a8fc3b624bf8e0227168658c0
SHA256a7195a4cfd66298143425c8d58ec4993eb1824a64f28568f1055c3b6f5448010
SHA512b29e3cf1e77dd8914f6fa374405f0a0d4715a9d8561ead90f188c97166c97509ad13a5e2356460b30abba1e373b94a3ae5404dbf4ddc4f46ed1bbc6476cd59b6
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD50af82cfb80b608136fb73ecd134fabd3
SHA1f31cdb3580a983ffc9ae5e8d00a9a64cd12b73b5
SHA256c07f549749c7c00d5f2b9a3273392ccfa6c63b225cf17abf43c3ede85b09b158
SHA5126df2bf7c4e0bb05ac9b1f2834b320103090e32d054447b8c2d9325fefd55c3b8c7607f2b1c6cd71f254771e003c974f964404831e4ba322c0404d9ede209ad1c
-
Filesize
72KB
MD50af82cfb80b608136fb73ecd134fabd3
SHA1f31cdb3580a983ffc9ae5e8d00a9a64cd12b73b5
SHA256c07f549749c7c00d5f2b9a3273392ccfa6c63b225cf17abf43c3ede85b09b158
SHA5126df2bf7c4e0bb05ac9b1f2834b320103090e32d054447b8c2d9325fefd55c3b8c7607f2b1c6cd71f254771e003c974f964404831e4ba322c0404d9ede209ad1c
-
Filesize
72KB
MD5973371893d6c9aa5c1064de208861ddf
SHA1194a6061132bc755599d51c9f2db7a9e12a68b8b
SHA25660c0808188cebb8e41c314d00a13b7353b33bcf36eb3a07533a332bc4f5522bb
SHA512329f97fa5de00d9bcf56447899f6ce9cb34a1b977e2d0b70c2c9b9f9ff206e4c46124fa9cfbfd27bfa3113cfce90230e001cbe6f4f3e58666fe1a1cbc4926038
-
Filesize
72KB
MD5973371893d6c9aa5c1064de208861ddf
SHA1194a6061132bc755599d51c9f2db7a9e12a68b8b
SHA25660c0808188cebb8e41c314d00a13b7353b33bcf36eb3a07533a332bc4f5522bb
SHA512329f97fa5de00d9bcf56447899f6ce9cb34a1b977e2d0b70c2c9b9f9ff206e4c46124fa9cfbfd27bfa3113cfce90230e001cbe6f4f3e58666fe1a1cbc4926038
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD5c7ce512288bcaed61bbfd2bb6520e1d4
SHA1065d0eebb0be4f1ca8fe6d9d6f0184141b3a4771
SHA256a13163dc5e7e4b8180361b905d16d3729b8233a3b6b6c3bec7128ca696ab9081
SHA51251e41c1eeebd4808879503a424b099ec9d49bc8a3b6dc2ca665446f7810ef28da6e285fd1770c8fc782ae5596a1e932b692f682f2d005f4a18307f26459765a8
-
Filesize
72KB
MD5c7ce512288bcaed61bbfd2bb6520e1d4
SHA1065d0eebb0be4f1ca8fe6d9d6f0184141b3a4771
SHA256a13163dc5e7e4b8180361b905d16d3729b8233a3b6b6c3bec7128ca696ab9081
SHA51251e41c1eeebd4808879503a424b099ec9d49bc8a3b6dc2ca665446f7810ef28da6e285fd1770c8fc782ae5596a1e932b692f682f2d005f4a18307f26459765a8
-
Filesize
72KB
MD56686a6363b4fabe900372b7b0c2a5b30
SHA1bebc1c2772ff24715c1afbe3323b15b5e3c0cca1
SHA256a98ae0e4325a066fad0632ad5dc5d7423dfc338930ebb5d25cd865072c2cb918
SHA512b0e3f75ee3996b70bb70bb385071f2c4d020e02f76919df6cdc512ea2eee8162ea66c2da1f229095d9c136a03de5c6e01baf4ccf0195ac9b861c65ea77aea2a8
-
Filesize
72KB
MD56686a6363b4fabe900372b7b0c2a5b30
SHA1bebc1c2772ff24715c1afbe3323b15b5e3c0cca1
SHA256a98ae0e4325a066fad0632ad5dc5d7423dfc338930ebb5d25cd865072c2cb918
SHA512b0e3f75ee3996b70bb70bb385071f2c4d020e02f76919df6cdc512ea2eee8162ea66c2da1f229095d9c136a03de5c6e01baf4ccf0195ac9b861c65ea77aea2a8
-
Filesize
72KB
MD554c004d61be0b6219b8ec614669e24e3
SHA15a09728ffd69c484a544a8b8480b06779cca4ee8
SHA256bffef7d85250276bef5f9b5b91740c7e97d26c36e65ef2d86254720d8f1e1e79
SHA512ab7e91de97babf69f3da8eb88d8741b053adf59d6b0f70c9a7e3ebbc16c18b987cd56d35829203dab322d805c6390edc1acc041fd167f3b1bca0be47a08925e9
-
Filesize
72KB
MD554c004d61be0b6219b8ec614669e24e3
SHA15a09728ffd69c484a544a8b8480b06779cca4ee8
SHA256bffef7d85250276bef5f9b5b91740c7e97d26c36e65ef2d86254720d8f1e1e79
SHA512ab7e91de97babf69f3da8eb88d8741b053adf59d6b0f70c9a7e3ebbc16c18b987cd56d35829203dab322d805c6390edc1acc041fd167f3b1bca0be47a08925e9
-
Filesize
72KB
MD54603b3ad9eacd51c43ac294b666b7c3d
SHA1d33d05f20a697c099dafed0664c901eb29fcd982
SHA25632ca3050951f896ebd7ac4b12165ecb9d351c0bb34b5f74cba7f235eb9fb56a5
SHA512cd2014bcf821fb7033cc04f0ce62f9e2c57c82c807edf4f1dcece19cee1f4a0d2c2865cf035a0913363c9915fb5a9148ea442bd85a9bf2ca452cd9698cfc5021
-
Filesize
72KB
MD54603b3ad9eacd51c43ac294b666b7c3d
SHA1d33d05f20a697c099dafed0664c901eb29fcd982
SHA25632ca3050951f896ebd7ac4b12165ecb9d351c0bb34b5f74cba7f235eb9fb56a5
SHA512cd2014bcf821fb7033cc04f0ce62f9e2c57c82c807edf4f1dcece19cee1f4a0d2c2865cf035a0913363c9915fb5a9148ea442bd85a9bf2ca452cd9698cfc5021
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5c5d23c3ce54df0ba37f8854df3e8f427
SHA1c82a37fd16aacd232c2e4b838ea4de550c3d8174
SHA256c6aa742720f9fbf1c31b6c3f3b176a707f6d0d93bd0d10da1a2ba8a905c925a0
SHA5127ab1f058525407e7a3a90a587711bf80471ff30e47b909109ef10b9233656ca181482fa7e055fd80fbe1e557f40d96bc0a66356a2e1d0a90d37c70e9e93c3d26
-
Filesize
72KB
MD5c5d23c3ce54df0ba37f8854df3e8f427
SHA1c82a37fd16aacd232c2e4b838ea4de550c3d8174
SHA256c6aa742720f9fbf1c31b6c3f3b176a707f6d0d93bd0d10da1a2ba8a905c925a0
SHA5127ab1f058525407e7a3a90a587711bf80471ff30e47b909109ef10b9233656ca181482fa7e055fd80fbe1e557f40d96bc0a66356a2e1d0a90d37c70e9e93c3d26
-
Filesize
72KB
MD59d26df4b287246ad003d0b9d0967fbc7
SHA16121bcb49daf9ef457aaab533796eec160e5e549
SHA256c9ca9bd7b26c20b94141be7dbfea29703fda5ec6d5cda52d56270a1020c50908
SHA512874ab411983a7cf36a8e1cf783c2aeaeae04cf6bc5393b89edf6c0a508220740531ccb05c5acf12d94d75fc308d09b2707ba2f7fef6a8b212d4721ee6ca2061a
-
Filesize
72KB
MD59d26df4b287246ad003d0b9d0967fbc7
SHA16121bcb49daf9ef457aaab533796eec160e5e549
SHA256c9ca9bd7b26c20b94141be7dbfea29703fda5ec6d5cda52d56270a1020c50908
SHA512874ab411983a7cf36a8e1cf783c2aeaeae04cf6bc5393b89edf6c0a508220740531ccb05c5acf12d94d75fc308d09b2707ba2f7fef6a8b212d4721ee6ca2061a
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD55ca3066ac26156100d27540078792af6
SHA1e2fb34bb00d0614164f3ea92d0a190ef5e5ef397
SHA256625abb858a2e50d62d6bd9fa8648131942f2bf9d2bf95b4e08a02baf8a2f9f82
SHA51252d170ddc45a78c71b3bc2537d5f9a9ac3a8cf4082891119d3767b25bd52fd69883954b2f78c3b2114440272a05295ec5855cee71f785cd2130e3e367b133c3a
-
Filesize
72KB
MD5dd48db42d844203eb3ac5a7b61eed1fc
SHA105dc0731e740e43a8fc3b624bf8e0227168658c0
SHA256a7195a4cfd66298143425c8d58ec4993eb1824a64f28568f1055c3b6f5448010
SHA512b29e3cf1e77dd8914f6fa374405f0a0d4715a9d8561ead90f188c97166c97509ad13a5e2356460b30abba1e373b94a3ae5404dbf4ddc4f46ed1bbc6476cd59b6
-
Filesize
72KB
MD5dd48db42d844203eb3ac5a7b61eed1fc
SHA105dc0731e740e43a8fc3b624bf8e0227168658c0
SHA256a7195a4cfd66298143425c8d58ec4993eb1824a64f28568f1055c3b6f5448010
SHA512b29e3cf1e77dd8914f6fa374405f0a0d4715a9d8561ead90f188c97166c97509ad13a5e2356460b30abba1e373b94a3ae5404dbf4ddc4f46ed1bbc6476cd59b6
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD5acaa48732de7ca850aeb6f1133c63da7
SHA163b73a3a1a0d1aa453d84834d638fbe9905ea0d4
SHA256e41a3c8122fb834dad99e620ea09d82c85f9c12bc1a2c2fdbb957a37d322cd5d
SHA51214a083c581b42a4feb04b88b01d3671d14f83df426cfff43910a62e428500f01de792831bd70252889fcdc7b4f03c7740eba3bd60a6715f7c1dc5265210a07d5
-
Filesize
72KB
MD56c968ee923c5ec46d07718805a7c0d9c
SHA15b51f1fb21541b4188c522ed5c296a7c5dd5e036
SHA2566cd9a417f0562c19e397c83eac676e536ae858c52252c275ec60b01516d13a7e
SHA512177a2c11485efa9bce22ed77b4fea0aac458f8e3be39cb5b2822f38a4f78187f7a9f8999dca04d6ebd1c0f08e773e9c95244c18c2b62446dbb9c81019dcc97b6
-
Filesize
72KB
MD56c968ee923c5ec46d07718805a7c0d9c
SHA15b51f1fb21541b4188c522ed5c296a7c5dd5e036
SHA2566cd9a417f0562c19e397c83eac676e536ae858c52252c275ec60b01516d13a7e
SHA512177a2c11485efa9bce22ed77b4fea0aac458f8e3be39cb5b2822f38a4f78187f7a9f8999dca04d6ebd1c0f08e773e9c95244c18c2b62446dbb9c81019dcc97b6
-
Filesize
72KB
MD50af82cfb80b608136fb73ecd134fabd3
SHA1f31cdb3580a983ffc9ae5e8d00a9a64cd12b73b5
SHA256c07f549749c7c00d5f2b9a3273392ccfa6c63b225cf17abf43c3ede85b09b158
SHA5126df2bf7c4e0bb05ac9b1f2834b320103090e32d054447b8c2d9325fefd55c3b8c7607f2b1c6cd71f254771e003c974f964404831e4ba322c0404d9ede209ad1c
-
Filesize
72KB
MD50af82cfb80b608136fb73ecd134fabd3
SHA1f31cdb3580a983ffc9ae5e8d00a9a64cd12b73b5
SHA256c07f549749c7c00d5f2b9a3273392ccfa6c63b225cf17abf43c3ede85b09b158
SHA5126df2bf7c4e0bb05ac9b1f2834b320103090e32d054447b8c2d9325fefd55c3b8c7607f2b1c6cd71f254771e003c974f964404831e4ba322c0404d9ede209ad1c
-
Filesize
72KB
MD5973371893d6c9aa5c1064de208861ddf
SHA1194a6061132bc755599d51c9f2db7a9e12a68b8b
SHA25660c0808188cebb8e41c314d00a13b7353b33bcf36eb3a07533a332bc4f5522bb
SHA512329f97fa5de00d9bcf56447899f6ce9cb34a1b977e2d0b70c2c9b9f9ff206e4c46124fa9cfbfd27bfa3113cfce90230e001cbe6f4f3e58666fe1a1cbc4926038
-
Filesize
72KB
MD5973371893d6c9aa5c1064de208861ddf
SHA1194a6061132bc755599d51c9f2db7a9e12a68b8b
SHA25660c0808188cebb8e41c314d00a13b7353b33bcf36eb3a07533a332bc4f5522bb
SHA512329f97fa5de00d9bcf56447899f6ce9cb34a1b977e2d0b70c2c9b9f9ff206e4c46124fa9cfbfd27bfa3113cfce90230e001cbe6f4f3e58666fe1a1cbc4926038
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5
-
Filesize
72KB
MD56cd7acf0a88891defe899a0769b203a8
SHA13934fe6f1091581794e77b7889daa5d44b97cd6a
SHA2568ce7d37b2731d6ba6c78ad9cfd0fbdc9ffc44bbf57742062dd290a4a78e67fb7
SHA512a1167f7d2596116420c7eac5f51171108188d998080c35f95fea6a85fd3cdc52ad80ed85bd6775551dbfcf0a5805517877a90a29f77a190f5be43119631f5bd5