Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe
Resource
win10v2004-20220812-en
General
-
Target
16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe
-
Size
72KB
-
MD5
f50d77c3d8978051ea81e795dd37644a
-
SHA1
bd57430be3e2923cccfabf7172a69695d1940fd5
-
SHA256
16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01
-
SHA512
82ba893af85eaf4d37a0810adb2e630869330bb70ea7495c946c0ee1e195caef58d1a3cc12da662a5210b1253d966a4cf10851a5eb231cfc4ed8a907f8d433ee
-
SSDEEP
384:N6wayA+1mwnA353BXR+oGfPmfm4MlcTGXdhjwroyY2rebV5O6KgxWb/83BXR+oGm:NpQNwC3BESe4Vqth+0V5vKlE3BEJwRrT
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1348 backup.exe 712 backup.exe 1492 backup.exe 568 backup.exe 1140 backup.exe 848 backup.exe 696 backup.exe 756 backup.exe 1272 backup.exe 1552 backup.exe 1376 backup.exe 1072 backup.exe 1576 backup.exe 1524 System Restore.exe 916 backup.exe 972 backup.exe 1620 backup.exe 1032 backup.exe 572 backup.exe 580 backup.exe 1192 backup.exe 788 backup.exe 1092 backup.exe 1824 backup.exe 844 backup.exe 1752 backup.exe 548 backup.exe 656 backup.exe 1236 data.exe 1948 backup.exe 316 backup.exe 1548 backup.exe 1700 backup.exe 896 backup.exe 1500 backup.exe 1376 backup.exe 1956 backup.exe 904 backup.exe 1760 backup.exe 1996 backup.exe 632 backup.exe 1728 backup.exe 640 backup.exe 712 backup.exe 1920 backup.exe 1636 data.exe 1888 backup.exe 1596 backup.exe 1716 backup.exe 1824 System Restore.exe 1836 backup.exe 696 backup.exe 1632 backup.exe 936 backup.exe 980 update.exe 1752 update.exe 1172 data.exe 1072 backup.exe 1300 backup.exe 2044 backup.exe 1352 backup.exe 436 backup.exe 1804 backup.exe 1776 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 568 backup.exe 568 backup.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 848 backup.exe 848 backup.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 568 backup.exe 568 backup.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1552 backup.exe 1552 backup.exe 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1072 backup.exe 1072 backup.exe 1552 backup.exe 1552 backup.exe 1524 System Restore.exe 1524 System Restore.exe 916 backup.exe 916 backup.exe 916 backup.exe 916 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1620 backup.exe 1236 data.exe 1236 data.exe 1236 data.exe 1236 data.exe 568 backup.exe 1524 System Restore.exe 1524 System Restore.exe 568 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\update.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\data.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\Application\backup.exe backup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\data.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 1348 backup.exe 712 backup.exe 1492 backup.exe 568 backup.exe 1140 backup.exe 848 backup.exe 696 backup.exe 756 backup.exe 1272 backup.exe 1552 backup.exe 1376 backup.exe 1072 backup.exe 1576 backup.exe 1524 System Restore.exe 916 backup.exe 972 backup.exe 1620 backup.exe 1032 backup.exe 572 backup.exe 580 backup.exe 1192 backup.exe 788 backup.exe 1092 backup.exe 1824 backup.exe 844 backup.exe 1752 backup.exe 548 backup.exe 656 backup.exe 1236 data.exe 1948 backup.exe 316 backup.exe 896 backup.exe 1500 backup.exe 1376 backup.exe 1700 backup.exe 1956 backup.exe 904 backup.exe 1760 backup.exe 632 backup.exe 1728 backup.exe 1996 backup.exe 640 backup.exe 712 backup.exe 1636 data.exe 1888 backup.exe 1920 backup.exe 1596 backup.exe 1716 backup.exe 1548 backup.exe 1824 System Restore.exe 1836 backup.exe 696 backup.exe 936 backup.exe 1632 backup.exe 1172 data.exe 1072 backup.exe 1300 backup.exe 2044 backup.exe 1352 backup.exe 436 backup.exe 1804 backup.exe 1752 update.exe 980 update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 1348 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 28 PID 1232 wrote to memory of 1348 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 28 PID 1232 wrote to memory of 1348 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 28 PID 1232 wrote to memory of 1348 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 28 PID 1232 wrote to memory of 712 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 29 PID 1232 wrote to memory of 712 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 29 PID 1232 wrote to memory of 712 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 29 PID 1232 wrote to memory of 712 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 29 PID 1232 wrote to memory of 1492 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 30 PID 1232 wrote to memory of 1492 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 30 PID 1232 wrote to memory of 1492 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 30 PID 1232 wrote to memory of 1492 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 30 PID 1348 wrote to memory of 568 1348 backup.exe 31 PID 1348 wrote to memory of 568 1348 backup.exe 31 PID 1348 wrote to memory of 568 1348 backup.exe 31 PID 1348 wrote to memory of 568 1348 backup.exe 31 PID 1232 wrote to memory of 1140 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 32 PID 1232 wrote to memory of 1140 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 32 PID 1232 wrote to memory of 1140 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 32 PID 1232 wrote to memory of 1140 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 32 PID 568 wrote to memory of 848 568 backup.exe 33 PID 568 wrote to memory of 848 568 backup.exe 33 PID 568 wrote to memory of 848 568 backup.exe 33 PID 568 wrote to memory of 848 568 backup.exe 33 PID 1232 wrote to memory of 696 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 34 PID 1232 wrote to memory of 696 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 34 PID 1232 wrote to memory of 696 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 34 PID 1232 wrote to memory of 696 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 34 PID 848 wrote to memory of 756 848 backup.exe 35 PID 848 wrote to memory of 756 848 backup.exe 35 PID 848 wrote to memory of 756 848 backup.exe 35 PID 848 wrote to memory of 756 848 backup.exe 35 PID 1232 wrote to memory of 1272 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 36 PID 1232 wrote to memory of 1272 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 36 PID 1232 wrote to memory of 1272 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 36 PID 1232 wrote to memory of 1272 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 36 PID 568 wrote to memory of 1552 568 backup.exe 37 PID 568 wrote to memory of 1552 568 backup.exe 37 PID 568 wrote to memory of 1552 568 backup.exe 37 PID 568 wrote to memory of 1552 568 backup.exe 37 PID 1552 wrote to memory of 1072 1552 backup.exe 39 PID 1552 wrote to memory of 1072 1552 backup.exe 39 PID 1552 wrote to memory of 1072 1552 backup.exe 39 PID 1552 wrote to memory of 1072 1552 backup.exe 39 PID 1232 wrote to memory of 1376 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 38 PID 1232 wrote to memory of 1376 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 38 PID 1232 wrote to memory of 1376 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 38 PID 1232 wrote to memory of 1376 1232 16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe 38 PID 1072 wrote to memory of 1576 1072 backup.exe 40 PID 1072 wrote to memory of 1576 1072 backup.exe 40 PID 1072 wrote to memory of 1576 1072 backup.exe 40 PID 1072 wrote to memory of 1576 1072 backup.exe 40 PID 1552 wrote to memory of 1524 1552 backup.exe 41 PID 1552 wrote to memory of 1524 1552 backup.exe 41 PID 1552 wrote to memory of 1524 1552 backup.exe 41 PID 1552 wrote to memory of 1524 1552 backup.exe 41 PID 1524 wrote to memory of 916 1524 System Restore.exe 42 PID 1524 wrote to memory of 916 1524 System Restore.exe 42 PID 1524 wrote to memory of 916 1524 System Restore.exe 42 PID 1524 wrote to memory of 916 1524 System Restore.exe 42 PID 916 wrote to memory of 972 916 backup.exe 43 PID 916 wrote to memory of 972 916 backup.exe 43 PID 916 wrote to memory of 972 916 backup.exe 43 PID 916 wrote to memory of 972 916 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe"C:\Users\Admin\AppData\Local\Temp\16b3e1a73d1a616b68b246f25151605155a73142ce7927c04b901eb14e545e01.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\4011261485\backup.exeC:\Users\Admin\AppData\Local\Temp\4011261485\backup.exe C:\Users\Admin\AppData\Local\Temp\4011261485\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\backup.exe\backup.exe \3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:568 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:848 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:756
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1552 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
C:\Program Files\Common Files\System Restore.exe"C:\Program Files\Common Files\System Restore.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:916 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:972
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:580
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1192
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1092
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:844
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1236 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1948
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:1504
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1760
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1888
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1172
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:856
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:1128
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1956 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1728
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:712
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1596
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵
- System policy modification
PID:1420
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- System policy modification
PID:1036
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
PID:1760
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:436
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
PID:544
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:984 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:964
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1636
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1964
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:896
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:632 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1920
-
-
-
C:\Program Files\Common Files\System\update.exe"C:\Program Files\Common Files\System\update.exe" C:\Program Files\Common Files\System\6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1752 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Drops file in Program Files directory
- System policy modification
PID:572 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:1976
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵PID:836
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:1560
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1824
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1692
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996
-
-
C:\Program Files\DVD Maker\en-US\data.exe"C:\Program Files\DVD Maker\en-US\data.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:696
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- System policy modification
PID:1996
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1144
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:924
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵
- Drops file in Program Files directory
- System policy modification
PID:1012 -
C:\Program Files\Google\Chrome\Application\backup.exe"C:\Program Files\Google\Chrome\Application\backup.exe" C:\Program Files\Google\Chrome\Application\7⤵
- Modifies visibility of file extensions in Explorer
PID:1584 -
C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\backup.exe" C:\Program Files\Google\Chrome\Application\89.0.4389.114\8⤵PID:1524
-
-
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1352 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
PID:524
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2032
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:292
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1464
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:544
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1276
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:588
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1548 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1888
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:368
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:656
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:1092
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1540
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1836 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- System policy modification
PID:1776 -
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
PID:1692
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:316
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:904
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1632
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:844
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Windows\addins\data.exeC:\Windows\addins\data.exe C:\Windows\addins\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1480
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:296
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:632
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1140
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f38f3590ee2f76e582841a44da3778ed
SHA192a330c853482122ab97e18530d43f7bac2f9979
SHA2567b4604ca0c47b4eed39e0f6cec37f75fdd009514b1190d307b3a1ad5c0aa1e6e
SHA512206568db4c3952a74e903eba1c40957a2fa60f8b67a2c15b47a944d5c2dbd95a43770bec6e859fcd98e54e0a01feb6968e4b9e4bcb58e46be8ae159ae9e932af
-
Filesize
72KB
MD593babc743afb95e478a0b193de667b06
SHA1a999da194723c9dc96781a07a2d5fe380c4722fd
SHA25659d6d286ab250b85a6bb1891af5329754464e37e6c4317420da42dca34be7c28
SHA51204e46f1eb1c84ba1572dfbc4253963b989197ca6d2a7ae6bce2067a60141b42b7d2926b7e2d5409e400c21374c05f2c192b9a8c5a2f36400d22f020a99d70369
-
Filesize
72KB
MD593babc743afb95e478a0b193de667b06
SHA1a999da194723c9dc96781a07a2d5fe380c4722fd
SHA25659d6d286ab250b85a6bb1891af5329754464e37e6c4317420da42dca34be7c28
SHA51204e46f1eb1c84ba1572dfbc4253963b989197ca6d2a7ae6bce2067a60141b42b7d2926b7e2d5409e400c21374c05f2c192b9a8c5a2f36400d22f020a99d70369
-
Filesize
72KB
MD567a9be1f9dca7bf0b32d020f0b7894fd
SHA14928fa7da3b0be3d7718c9516ee9d2d9eafb45f6
SHA2563cf4ac371fea104726e3f67301e2f90c6645a110cef389b8331fb1c8d6b0ce2f
SHA51251ecb24bbe90dddfe61855752bfc8549dd847f0198853f5af5cdf7a90d3337f7cceaaa2b4c8b61f69e6f0b1685bd850522da3643335fe81ebf3a84dcc95fe5d2
-
Filesize
72KB
MD518590113a33389966ac8963f9e81235d
SHA102bec8d2d04b38ad0288bedab620d9493fd971a3
SHA25650c1379764f3c81240b265da51674055920278d6dbb89bd1ad1101f84a151249
SHA512e160f9f62038ff9ce2394c3fc0770b62190916e3c6c7f4229dc1cfa45239362e9908c9624d88b2eb1da54bd001dde65b0a9237870bf0d045743661384ec049c0
-
Filesize
72KB
MD518590113a33389966ac8963f9e81235d
SHA102bec8d2d04b38ad0288bedab620d9493fd971a3
SHA25650c1379764f3c81240b265da51674055920278d6dbb89bd1ad1101f84a151249
SHA512e160f9f62038ff9ce2394c3fc0770b62190916e3c6c7f4229dc1cfa45239362e9908c9624d88b2eb1da54bd001dde65b0a9237870bf0d045743661384ec049c0
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD510214c553fda854e99e389ec116df87e
SHA118945c38f5de9e284c9fbdd6ce4943eb9a9202c9
SHA256cb8935ee015cdc56db3d3774649da0782619801630a3cf3a015091006b2aff13
SHA512027a69ea4b9709c2b5790416ccffa2247998e69f6780ecdef233ec2d25810f0bbda1e20358f695de8902fe23025fd397f79c6d7ab18c005cdbb5d93904d9eeee
-
Filesize
72KB
MD510214c553fda854e99e389ec116df87e
SHA118945c38f5de9e284c9fbdd6ce4943eb9a9202c9
SHA256cb8935ee015cdc56db3d3774649da0782619801630a3cf3a015091006b2aff13
SHA512027a69ea4b9709c2b5790416ccffa2247998e69f6780ecdef233ec2d25810f0bbda1e20358f695de8902fe23025fd397f79c6d7ab18c005cdbb5d93904d9eeee
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5fcfcd027300ebcb036caea2ab28b6cb2
SHA117887337aca7eff86a22d09d6e6fe74b74609220
SHA256036b22b3a023c1dd0d8600472a89feea552dadb142545ca8c2c0afc66d598ac5
SHA512bad4ded684c4bb87e326701bf3de169d02b7cad42d6425c83642c4666d48e052849ed7de552c64a5b95551eb51146f4fbea09e66277dd8b132d83a970c4df33a
-
Filesize
72KB
MD5fcfcd027300ebcb036caea2ab28b6cb2
SHA117887337aca7eff86a22d09d6e6fe74b74609220
SHA256036b22b3a023c1dd0d8600472a89feea552dadb142545ca8c2c0afc66d598ac5
SHA512bad4ded684c4bb87e326701bf3de169d02b7cad42d6425c83642c4666d48e052849ed7de552c64a5b95551eb51146f4fbea09e66277dd8b132d83a970c4df33a
-
Filesize
72KB
MD533f75f09c08226f2e49ba4fd78ed35ac
SHA1f20eb3801da7e20192ecfcb3cf81b85df77d3eec
SHA256ba2a6a63c9121a5ffdd8b630bafba3e4a73da348abee5d85c4f816ce8d7af0e6
SHA512ad7c6e72d21640247f72bd1351d0b84515589a38d563dcdac6c1f597629567f36eeb205496bbfc818c88e169d7dc2b25d6173c04d3d936f5c45f38a265df6deb
-
Filesize
72KB
MD533f75f09c08226f2e49ba4fd78ed35ac
SHA1f20eb3801da7e20192ecfcb3cf81b85df77d3eec
SHA256ba2a6a63c9121a5ffdd8b630bafba3e4a73da348abee5d85c4f816ce8d7af0e6
SHA512ad7c6e72d21640247f72bd1351d0b84515589a38d563dcdac6c1f597629567f36eeb205496bbfc818c88e169d7dc2b25d6173c04d3d936f5c45f38a265df6deb
-
Filesize
72KB
MD510a3cbffdc8d0fa8f763b751cf1f6db9
SHA16e9ce00f015ca249b61358c2c1d32e74bdeb0561
SHA256aa102e8df1cad3dfa26cabd5a42faca642ff23ba2f7fdd20269a8709c96651c4
SHA51234961f8fa1cd516e20505f700c55c8b7d927ad09d37e6365613120cc72a80bc8e2d5a327c87fc047d841bfa7ac399832273ad1500c06f26bdd6435c4052c6a0c
-
Filesize
72KB
MD510a3cbffdc8d0fa8f763b751cf1f6db9
SHA16e9ce00f015ca249b61358c2c1d32e74bdeb0561
SHA256aa102e8df1cad3dfa26cabd5a42faca642ff23ba2f7fdd20269a8709c96651c4
SHA51234961f8fa1cd516e20505f700c55c8b7d927ad09d37e6365613120cc72a80bc8e2d5a327c87fc047d841bfa7ac399832273ad1500c06f26bdd6435c4052c6a0c
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a2139ac0537e42d3e85a860903d31cd6
SHA114d357a65b9a89f8bc53d4506a576223b5228783
SHA256827554f874ef6b30517b38da70b76f15774426ae0e4c069189a117999c892e2d
SHA512e619d4e637a80dc0d11a84e087b1d87271def308cfb6ac8dfbd4f33f023c71c8377186f6bd45665e0dee4b663dfc91be1414209f2a57729ef5a2142d18556c93
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53876c1a1eed20446821b2289f349f3f7
SHA1352e3319f24615d827141326c6b5ba15108d1b03
SHA25665287f3c4d68ce0c9d40f80396dc0e2bf990ecb404023a8ea53fed95d1d20b29
SHA51261e00b6e553bc558c7761589c45df3a9ce81316a8efd74315621caad5ac83384077fc7dde3ec1a28a21727dc12c9a468f7dfb2b33899752e68a771c42310140c
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50
-
Filesize
72KB
MD5ac65dd796735f68bc466eca7cef8c818
SHA1f10a627c0d1d5ec57b2169b78dde177078f2e61e
SHA256a219e357b0cee9895b6bf3dbdb33f395ce25dc922e4b334a52b1c072fbe41037
SHA512de4e705112ee45bdf8f81d1bc397942f46adbce7799df2f589868ede30de267223e8cf74efd7e0ea0ad183b9c987cf2d8338593b43d0a8b24521c514cddcfeba
-
Filesize
72KB
MD5ac65dd796735f68bc466eca7cef8c818
SHA1f10a627c0d1d5ec57b2169b78dde177078f2e61e
SHA256a219e357b0cee9895b6bf3dbdb33f395ce25dc922e4b334a52b1c072fbe41037
SHA512de4e705112ee45bdf8f81d1bc397942f46adbce7799df2f589868ede30de267223e8cf74efd7e0ea0ad183b9c987cf2d8338593b43d0a8b24521c514cddcfeba
-
Filesize
72KB
MD5f38f3590ee2f76e582841a44da3778ed
SHA192a330c853482122ab97e18530d43f7bac2f9979
SHA2567b4604ca0c47b4eed39e0f6cec37f75fdd009514b1190d307b3a1ad5c0aa1e6e
SHA512206568db4c3952a74e903eba1c40957a2fa60f8b67a2c15b47a944d5c2dbd95a43770bec6e859fcd98e54e0a01feb6968e4b9e4bcb58e46be8ae159ae9e932af
-
Filesize
72KB
MD5f38f3590ee2f76e582841a44da3778ed
SHA192a330c853482122ab97e18530d43f7bac2f9979
SHA2567b4604ca0c47b4eed39e0f6cec37f75fdd009514b1190d307b3a1ad5c0aa1e6e
SHA512206568db4c3952a74e903eba1c40957a2fa60f8b67a2c15b47a944d5c2dbd95a43770bec6e859fcd98e54e0a01feb6968e4b9e4bcb58e46be8ae159ae9e932af
-
Filesize
72KB
MD593babc743afb95e478a0b193de667b06
SHA1a999da194723c9dc96781a07a2d5fe380c4722fd
SHA25659d6d286ab250b85a6bb1891af5329754464e37e6c4317420da42dca34be7c28
SHA51204e46f1eb1c84ba1572dfbc4253963b989197ca6d2a7ae6bce2067a60141b42b7d2926b7e2d5409e400c21374c05f2c192b9a8c5a2f36400d22f020a99d70369
-
Filesize
72KB
MD593babc743afb95e478a0b193de667b06
SHA1a999da194723c9dc96781a07a2d5fe380c4722fd
SHA25659d6d286ab250b85a6bb1891af5329754464e37e6c4317420da42dca34be7c28
SHA51204e46f1eb1c84ba1572dfbc4253963b989197ca6d2a7ae6bce2067a60141b42b7d2926b7e2d5409e400c21374c05f2c192b9a8c5a2f36400d22f020a99d70369
-
Filesize
72KB
MD567a9be1f9dca7bf0b32d020f0b7894fd
SHA14928fa7da3b0be3d7718c9516ee9d2d9eafb45f6
SHA2563cf4ac371fea104726e3f67301e2f90c6645a110cef389b8331fb1c8d6b0ce2f
SHA51251ecb24bbe90dddfe61855752bfc8549dd847f0198853f5af5cdf7a90d3337f7cceaaa2b4c8b61f69e6f0b1685bd850522da3643335fe81ebf3a84dcc95fe5d2
-
Filesize
72KB
MD567a9be1f9dca7bf0b32d020f0b7894fd
SHA14928fa7da3b0be3d7718c9516ee9d2d9eafb45f6
SHA2563cf4ac371fea104726e3f67301e2f90c6645a110cef389b8331fb1c8d6b0ce2f
SHA51251ecb24bbe90dddfe61855752bfc8549dd847f0198853f5af5cdf7a90d3337f7cceaaa2b4c8b61f69e6f0b1685bd850522da3643335fe81ebf3a84dcc95fe5d2
-
Filesize
72KB
MD518590113a33389966ac8963f9e81235d
SHA102bec8d2d04b38ad0288bedab620d9493fd971a3
SHA25650c1379764f3c81240b265da51674055920278d6dbb89bd1ad1101f84a151249
SHA512e160f9f62038ff9ce2394c3fc0770b62190916e3c6c7f4229dc1cfa45239362e9908c9624d88b2eb1da54bd001dde65b0a9237870bf0d045743661384ec049c0
-
Filesize
72KB
MD518590113a33389966ac8963f9e81235d
SHA102bec8d2d04b38ad0288bedab620d9493fd971a3
SHA25650c1379764f3c81240b265da51674055920278d6dbb89bd1ad1101f84a151249
SHA512e160f9f62038ff9ce2394c3fc0770b62190916e3c6c7f4229dc1cfa45239362e9908c9624d88b2eb1da54bd001dde65b0a9237870bf0d045743661384ec049c0
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD510214c553fda854e99e389ec116df87e
SHA118945c38f5de9e284c9fbdd6ce4943eb9a9202c9
SHA256cb8935ee015cdc56db3d3774649da0782619801630a3cf3a015091006b2aff13
SHA512027a69ea4b9709c2b5790416ccffa2247998e69f6780ecdef233ec2d25810f0bbda1e20358f695de8902fe23025fd397f79c6d7ab18c005cdbb5d93904d9eeee
-
Filesize
72KB
MD510214c553fda854e99e389ec116df87e
SHA118945c38f5de9e284c9fbdd6ce4943eb9a9202c9
SHA256cb8935ee015cdc56db3d3774649da0782619801630a3cf3a015091006b2aff13
SHA512027a69ea4b9709c2b5790416ccffa2247998e69f6780ecdef233ec2d25810f0bbda1e20358f695de8902fe23025fd397f79c6d7ab18c005cdbb5d93904d9eeee
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD5c225150f7b238daec0c8e1155743a238
SHA1bab1e21f4672217dd352e96d0ba8f11cc76f86b5
SHA256eeb7eeb2e651bb0930be21bf2a68c65d044a2e601d0a08b2aaf73c887ce5201c
SHA512529cce434cf8c1c3726011af8d4e5b8c03b0d6174b6fbc742ba0f66bac320e349456329f34bf7e318bb4a0841e19bbd7f45018f93dabe180e1e02fd75c23bd99
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5e95549807e905bd74d3c02ff5e6ab073
SHA16d08a9bf18e7b4873e5f840cac4e07ec24b5428e
SHA25649d3f2e8a71754eda85a7e7aa6c43f7641cf170e9b5887bcf0dda8c8317d56cf
SHA512a71d4d5495e23288dc6eaefcf7d025445f69b831b0e393d35429e864e7cc627989d1741272ef561083c92d780d30cbf0cf1b7c3b4f473a3434e48b784ce23bbf
-
Filesize
72KB
MD5fcfcd027300ebcb036caea2ab28b6cb2
SHA117887337aca7eff86a22d09d6e6fe74b74609220
SHA256036b22b3a023c1dd0d8600472a89feea552dadb142545ca8c2c0afc66d598ac5
SHA512bad4ded684c4bb87e326701bf3de169d02b7cad42d6425c83642c4666d48e052849ed7de552c64a5b95551eb51146f4fbea09e66277dd8b132d83a970c4df33a
-
Filesize
72KB
MD5fcfcd027300ebcb036caea2ab28b6cb2
SHA117887337aca7eff86a22d09d6e6fe74b74609220
SHA256036b22b3a023c1dd0d8600472a89feea552dadb142545ca8c2c0afc66d598ac5
SHA512bad4ded684c4bb87e326701bf3de169d02b7cad42d6425c83642c4666d48e052849ed7de552c64a5b95551eb51146f4fbea09e66277dd8b132d83a970c4df33a
-
Filesize
72KB
MD533f75f09c08226f2e49ba4fd78ed35ac
SHA1f20eb3801da7e20192ecfcb3cf81b85df77d3eec
SHA256ba2a6a63c9121a5ffdd8b630bafba3e4a73da348abee5d85c4f816ce8d7af0e6
SHA512ad7c6e72d21640247f72bd1351d0b84515589a38d563dcdac6c1f597629567f36eeb205496bbfc818c88e169d7dc2b25d6173c04d3d936f5c45f38a265df6deb
-
Filesize
72KB
MD533f75f09c08226f2e49ba4fd78ed35ac
SHA1f20eb3801da7e20192ecfcb3cf81b85df77d3eec
SHA256ba2a6a63c9121a5ffdd8b630bafba3e4a73da348abee5d85c4f816ce8d7af0e6
SHA512ad7c6e72d21640247f72bd1351d0b84515589a38d563dcdac6c1f597629567f36eeb205496bbfc818c88e169d7dc2b25d6173c04d3d936f5c45f38a265df6deb
-
Filesize
72KB
MD510a3cbffdc8d0fa8f763b751cf1f6db9
SHA16e9ce00f015ca249b61358c2c1d32e74bdeb0561
SHA256aa102e8df1cad3dfa26cabd5a42faca642ff23ba2f7fdd20269a8709c96651c4
SHA51234961f8fa1cd516e20505f700c55c8b7d927ad09d37e6365613120cc72a80bc8e2d5a327c87fc047d841bfa7ac399832273ad1500c06f26bdd6435c4052c6a0c
-
Filesize
72KB
MD510a3cbffdc8d0fa8f763b751cf1f6db9
SHA16e9ce00f015ca249b61358c2c1d32e74bdeb0561
SHA256aa102e8df1cad3dfa26cabd5a42faca642ff23ba2f7fdd20269a8709c96651c4
SHA51234961f8fa1cd516e20505f700c55c8b7d927ad09d37e6365613120cc72a80bc8e2d5a327c87fc047d841bfa7ac399832273ad1500c06f26bdd6435c4052c6a0c
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a2139ac0537e42d3e85a860903d31cd6
SHA114d357a65b9a89f8bc53d4506a576223b5228783
SHA256827554f874ef6b30517b38da70b76f15774426ae0e4c069189a117999c892e2d
SHA512e619d4e637a80dc0d11a84e087b1d87271def308cfb6ac8dfbd4f33f023c71c8377186f6bd45665e0dee4b663dfc91be1414209f2a57729ef5a2142d18556c93
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5a2139ac0537e42d3e85a860903d31cd6
SHA114d357a65b9a89f8bc53d4506a576223b5228783
SHA256827554f874ef6b30517b38da70b76f15774426ae0e4c069189a117999c892e2d
SHA512e619d4e637a80dc0d11a84e087b1d87271def308cfb6ac8dfbd4f33f023c71c8377186f6bd45665e0dee4b663dfc91be1414209f2a57729ef5a2142d18556c93
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53876c1a1eed20446821b2289f349f3f7
SHA1352e3319f24615d827141326c6b5ba15108d1b03
SHA25665287f3c4d68ce0c9d40f80396dc0e2bf990ecb404023a8ea53fed95d1d20b29
SHA51261e00b6e553bc558c7761589c45df3a9ce81316a8efd74315621caad5ac83384077fc7dde3ec1a28a21727dc12c9a468f7dfb2b33899752e68a771c42310140c
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD53876c1a1eed20446821b2289f349f3f7
SHA1352e3319f24615d827141326c6b5ba15108d1b03
SHA25665287f3c4d68ce0c9d40f80396dc0e2bf990ecb404023a8ea53fed95d1d20b29
SHA51261e00b6e553bc558c7761589c45df3a9ce81316a8efd74315621caad5ac83384077fc7dde3ec1a28a21727dc12c9a468f7dfb2b33899752e68a771c42310140c
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
Filesize
72KB
MD5e2cf4391ca4fee74aa4b973f02b6a965
SHA1500f6f0a8dc6a7dba9ec15218c01e061dbb10a6e
SHA256388030bef34b2aa746400f29e860fc64562b52dfc67b1b61e38274016dc7b702
SHA512438af42612f6dcd33b46dd948212b0d212f6d36227ee768358ebb7cdae222bb4be8122a72879f669df9f1bed45a30e474c38e8575586121307374324966ad7ef
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50
-
Filesize
72KB
MD5d562d4c522673a53eedcb159ddb50970
SHA186a0d155268c9d4399fbe9eb693d881c8888571c
SHA2560299c509ccbb44ba62b20f4abedef603e351007836d50e6c44bb62fb44fa254f
SHA51264dbb246fb76c1c9fa128184fb7b4d53b6e65b35ced3e69115d04b28a27307d7170d1cdf632866d86542d39c1c0303cb4731ec26a8ab3cd6e71ecc1b643e7b50