Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:31
Behavioral task
behavioral1
Sample
NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe
Resource
win7-20230831-en
General
-
Target
NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe
-
Size
450KB
-
MD5
a1e570cc6d9fe3c20874d9320acbba40
-
SHA1
0d8fbb182ae0bcec892bdfc274a260673f288aa8
-
SHA256
00b473212e5f9bc2f844c138bcefe6ff6adb206d365312c8e4bf613c26f5eed5
-
SHA512
15c0a90e8a6390f62fdaac264d028c8246f3ffdbcb6c64cc507d6e186bdad7589e03c3770a47119176f31a83e48db4463a7f3e7e1f7defa62488c39a0ade42d2
-
SSDEEP
768:/pQNwC3BESe4Vqth+0V5vKPyLylze70wi3BEmRjmJM:BeT7BVwxfvLFwjRRn
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2096 backup.exe 2764 backup.exe 2704 backup.exe 2844 backup.exe 2480 backup.exe 2528 backup.exe 740 backup.exe 796 backup.exe 2808 backup.exe 820 backup.exe 2004 backup.exe 1692 backup.exe 2400 update.exe 2252 backup.exe 2136 backup.exe 2900 backup.exe 1512 backup.exe 1544 backup.exe 1316 backup.exe 1988 backup.exe 892 backup.exe 2928 backup.exe 2108 backup.exe 1252 backup.exe 1564 backup.exe 2220 backup.exe 3040 backup.exe 2100 backup.exe 2740 backup.exe 2644 backup.exe 2872 backup.exe 2604 backup.exe 2420 backup.exe 2608 backup.exe 680 backup.exe 344 backup.exe 2528 backup.exe 2472 backup.exe 2800 backup.exe 1848 backup.exe 1008 backup.exe 1996 backup.exe 2008 backup.exe 2208 update.exe 1908 backup.exe 2960 backup.exe 1824 data.exe 2124 backup.exe 2376 backup.exe 3020 backup.exe 1372 backup.exe 1592 backup.exe 968 backup.exe 1964 backup.exe 616 backup.exe 1364 backup.exe 1808 backup.exe 3004 System Restore.exe 2984 backup.exe 1656 backup.exe 1700 backup.exe 848 backup.exe 2632 backup.exe 2596 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2844 backup.exe 2480 backup.exe 2480 backup.exe 2528 backup.exe 2528 backup.exe 2480 backup.exe 2480 backup.exe 796 backup.exe 796 backup.exe 2808 backup.exe 2808 backup.exe 796 backup.exe 796 backup.exe 2004 backup.exe 2004 backup.exe 1692 backup.exe 2400 update.exe 2400 update.exe 2400 update.exe 1692 backup.exe 1692 backup.exe 2252 backup.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2252 backup.exe 2252 backup.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2480 backup.exe 2480 backup.exe 2252 backup.exe 2252 backup.exe 1564 backup.exe 1564 backup.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 2252 backup.exe 3040 backup.exe 3040 backup.exe 2004 backup.exe 2004 backup.exe 796 backup.exe -
resource yara_rule behavioral1/memory/2788-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0037000000016669-5.dat upx behavioral1/files/0x0037000000016669-7.dat upx behavioral1/files/0x0037000000016669-9.dat upx behavioral1/files/0x0037000000016669-12.dat upx behavioral1/memory/2096-13-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2788-18-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0009000000016c35-17.dat upx behavioral1/files/0x0009000000016c35-24.dat upx behavioral1/files/0x0009000000016c35-20.dat upx behavioral1/memory/2764-29-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0007000000016cac-30.dat upx behavioral1/files/0x0007000000016cac-32.dat upx behavioral1/files/0x0007000000016cac-37.dat upx behavioral1/files/0x0008000000016c76-42.dat upx behavioral1/files/0x0008000000016c76-48.dat upx behavioral1/files/0x0008000000016c76-44.dat upx behavioral1/files/0x0037000000016669-52.dat upx behavioral1/files/0x0008000000016c76-57.dat upx behavioral1/memory/2096-61-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0007000000016d2e-62.dat upx behavioral1/files/0x0008000000016cf0-60.dat upx behavioral1/files/0x0008000000016cf0-65.dat upx behavioral1/files/0x0006000000016d4d-67.dat upx behavioral1/files/0x0006000000016d4d-69.dat upx behavioral1/memory/2704-75-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d4d-74.dat upx behavioral1/files/0x0006000000016d4d-78.dat upx behavioral1/memory/2704-80-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d6e-81.dat upx behavioral1/files/0x0006000000016d6e-84.dat upx behavioral1/memory/2844-88-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d6e-89.dat upx behavioral1/memory/740-94-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/2528-95-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d7c-96.dat upx behavioral1/memory/2480-103-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d7c-99.dat upx behavioral1/files/0x0006000000016d7c-104.dat upx behavioral1/files/0x0006000000016d7c-107.dat upx behavioral1/files/0x0007000000016d76-111.dat upx behavioral1/files/0x0007000000016d76-116.dat upx behavioral1/files/0x0007000000016d76-109.dat upx behavioral1/files/0x0007000000016d76-119.dat upx behavioral1/files/0x0006000000016d8a-121.dat upx behavioral1/files/0x0006000000016d8a-123.dat upx behavioral1/files/0x0006000000016d8a-127.dat upx behavioral1/memory/2808-131-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/memory/820-130-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0007000000016d82-133.dat upx behavioral1/files/0x0007000000016d82-139.dat upx behavioral1/files/0x0007000000016d82-135.dat upx behavioral1/files/0x0007000000016d82-142.dat upx behavioral1/files/0x0006000000016d9f-144.dat upx behavioral1/memory/796-150-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral1/files/0x0006000000016d9f-146.dat upx behavioral1/files/0x0006000000016d9f-151.dat upx behavioral1/files/0x0006000000016d9f-155.dat upx behavioral1/files/0x0006000000016e61-157.dat upx behavioral1/files/0x0006000000016e61-160.dat upx behavioral1/files/0x0006000000016e61-161.dat upx behavioral1/files/0x0006000000016e61-162.dat upx behavioral1/files/0x0006000000016e61-163.dat upx behavioral1/files/0x0006000000016e61-166.dat upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\update.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\MSBuild\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\msadc\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\backup.exe backup.exe File opened for modification C:\Program Files\Reference Assemblies\backup.exe backup.exe File opened for modification C:\Program Files\VideoLAN\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Games\Chess\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\AppPatch64\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe File opened for modification C:\Windows\Cursors\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 2096 backup.exe 2764 backup.exe 2704 backup.exe 2844 backup.exe 2480 backup.exe 2528 backup.exe 740 backup.exe 796 backup.exe 2808 backup.exe 820 backup.exe 2004 backup.exe 1692 backup.exe 2400 update.exe 2252 backup.exe 2136 backup.exe 2900 backup.exe 1512 backup.exe 1544 backup.exe 1316 backup.exe 1988 backup.exe 892 backup.exe 2928 backup.exe 2108 backup.exe 1252 backup.exe 1564 backup.exe 2220 backup.exe 3040 backup.exe 2100 backup.exe 2740 backup.exe 2644 backup.exe 2872 backup.exe 2604 backup.exe 2420 backup.exe 2608 backup.exe 680 backup.exe 344 backup.exe 2528 backup.exe 2472 backup.exe 2800 backup.exe 1848 backup.exe 1008 backup.exe 1996 backup.exe 2008 backup.exe 2960 backup.exe 1908 backup.exe 2208 update.exe 1824 data.exe 1372 backup.exe 2376 backup.exe 3020 backup.exe 968 backup.exe 1592 backup.exe 1964 backup.exe 616 backup.exe 1364 backup.exe 1808 backup.exe 2984 backup.exe 3004 System Restore.exe 848 backup.exe 1656 backup.exe 1700 backup.exe 3068 backup.exe 2468 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2096 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 28 PID 2788 wrote to memory of 2096 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 28 PID 2788 wrote to memory of 2096 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 28 PID 2788 wrote to memory of 2096 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 28 PID 2788 wrote to memory of 2764 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 29 PID 2788 wrote to memory of 2764 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 29 PID 2788 wrote to memory of 2764 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 29 PID 2788 wrote to memory of 2764 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 29 PID 2788 wrote to memory of 2704 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 30 PID 2788 wrote to memory of 2704 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 30 PID 2788 wrote to memory of 2704 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 30 PID 2788 wrote to memory of 2704 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 30 PID 2788 wrote to memory of 2844 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 31 PID 2788 wrote to memory of 2844 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 31 PID 2788 wrote to memory of 2844 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 31 PID 2788 wrote to memory of 2844 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 31 PID 2096 wrote to memory of 2480 2096 backup.exe 32 PID 2096 wrote to memory of 2480 2096 backup.exe 32 PID 2096 wrote to memory of 2480 2096 backup.exe 32 PID 2096 wrote to memory of 2480 2096 backup.exe 32 PID 2480 wrote to memory of 2528 2480 backup.exe 34 PID 2480 wrote to memory of 2528 2480 backup.exe 34 PID 2480 wrote to memory of 2528 2480 backup.exe 34 PID 2480 wrote to memory of 2528 2480 backup.exe 34 PID 2528 wrote to memory of 740 2528 backup.exe 35 PID 2528 wrote to memory of 740 2528 backup.exe 35 PID 2528 wrote to memory of 740 2528 backup.exe 35 PID 2528 wrote to memory of 740 2528 backup.exe 35 PID 2480 wrote to memory of 796 2480 backup.exe 36 PID 2480 wrote to memory of 796 2480 backup.exe 36 PID 2480 wrote to memory of 796 2480 backup.exe 36 PID 2480 wrote to memory of 796 2480 backup.exe 36 PID 796 wrote to memory of 2808 796 backup.exe 37 PID 796 wrote to memory of 2808 796 backup.exe 37 PID 796 wrote to memory of 2808 796 backup.exe 37 PID 796 wrote to memory of 2808 796 backup.exe 37 PID 2808 wrote to memory of 820 2808 backup.exe 38 PID 2808 wrote to memory of 820 2808 backup.exe 38 PID 2808 wrote to memory of 820 2808 backup.exe 38 PID 2808 wrote to memory of 820 2808 backup.exe 38 PID 796 wrote to memory of 2004 796 backup.exe 39 PID 796 wrote to memory of 2004 796 backup.exe 39 PID 796 wrote to memory of 2004 796 backup.exe 39 PID 796 wrote to memory of 2004 796 backup.exe 39 PID 2004 wrote to memory of 1692 2004 backup.exe 40 PID 2004 wrote to memory of 1692 2004 backup.exe 40 PID 2004 wrote to memory of 1692 2004 backup.exe 40 PID 2004 wrote to memory of 1692 2004 backup.exe 40 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2400 1692 backup.exe 42 PID 1692 wrote to memory of 2252 1692 backup.exe 44 PID 1692 wrote to memory of 2252 1692 backup.exe 44 PID 1692 wrote to memory of 2252 1692 backup.exe 44 PID 1692 wrote to memory of 2252 1692 backup.exe 44 PID 2788 wrote to memory of 2136 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 45 PID 2788 wrote to memory of 2136 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 45 PID 2788 wrote to memory of 2136 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 45 PID 2788 wrote to memory of 2136 2788 NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe 45 PID 2252 wrote to memory of 2900 2252 backup.exe 46 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a1e570cc6d9fe3c20874d9320acbba40.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3543811492\backup.exeC:\Users\Admin\AppData\Local\Temp\3543811492\backup.exe C:\Users\Admin\AppData\Local\Temp\3543811492\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2096 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2480 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2528 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:740
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:796 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:820
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2004 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1692 -
C:\Program Files\Common Files\Microsoft Shared\Filters\update.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\update.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2900
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1512
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2928
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1252
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2220
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2100
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1996 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2376
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵PID:3008
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
PID:2636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵PID:1468
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵PID:2860
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵PID:1544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:2680
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:2604
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:2660
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:2084
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵PID:2640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵PID:2008
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1848 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Executes dropped EXE
PID:2124
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:2512
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:1660
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1988
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1432
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:1684
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2888 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\data.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
PID:2552
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1352
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:744
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\update.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\update.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:2264
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\VC\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵
- System policy modification
PID:2280
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:1928
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2100
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:680 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2800
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Program Files\Common Files\System\ado\de-DE\backup.exe"C:\Program Files\Common Files\System\ado\de-DE\backup.exe" C:\Program Files\Common Files\System\ado\de-DE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
C:\Program Files\Common Files\System\ado\en-US\backup.exe"C:\Program Files\Common Files\System\ado\en-US\backup.exe" C:\Program Files\Common Files\System\ado\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2468
-
-
C:\Program Files\Common Files\System\ado\es-ES\backup.exe"C:\Program Files\Common Files\System\ado\es-ES\backup.exe" C:\Program Files\Common Files\System\ado\es-ES\8⤵PID:2840
-
-
C:\Program Files\Common Files\System\ado\fr-FR\backup.exe"C:\Program Files\Common Files\System\ado\fr-FR\backup.exe" C:\Program Files\Common Files\System\ado\fr-FR\8⤵PID:1940
-
-
C:\Program Files\Common Files\System\ado\it-IT\backup.exe"C:\Program Files\Common Files\System\ado\it-IT\backup.exe" C:\Program Files\Common Files\System\ado\it-IT\8⤵PID:2408
-
-
C:\Program Files\Common Files\System\ado\ja-JP\backup.exe"C:\Program Files\Common Files\System\ado\ja-JP\backup.exe" C:\Program Files\Common Files\System\ado\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2976
-
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵
- System policy modification
PID:2740
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵
- System policy modification
PID:1780
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1976
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1944
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:848
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1036
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:1708
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:1020
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:344
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1008
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2960
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵PID:2684
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
PID:2632
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2784 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:2792
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:2700
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:1756
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:2820
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:2284
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2304
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:436
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵
- Drops file in Program Files directory
PID:2608 -
C:\Program Files\Microsoft Games\Chess\backup.exe"C:\Program Files\Microsoft Games\Chess\backup.exe" C:\Program Files\Microsoft Games\Chess\6⤵PID:2772
-
-
C:\Program Files\Microsoft Games\FreeCell\backup.exe"C:\Program Files\Microsoft Games\FreeCell\backup.exe" C:\Program Files\Microsoft Games\FreeCell\6⤵PID:2088
-
-
C:\Program Files\Microsoft Games\Hearts\backup.exe"C:\Program Files\Microsoft Games\Hearts\backup.exe" C:\Program Files\Microsoft Games\Hearts\6⤵PID:2836
-
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2892 -
C:\Program Files\Microsoft Office\Office14\backup.exe"C:\Program Files\Microsoft Office\Office14\backup.exe" C:\Program Files\Microsoft Office\Office14\6⤵PID:1096
-
-
-
C:\Program Files\Mozilla Firefox\System Restore.exe"C:\Program Files\Mozilla Firefox\System Restore.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1604
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2808
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:1712
-
-
C:\Program Files\VideoLAN\backup.exe"C:\Program Files\VideoLAN\backup.exe" C:\Program Files\VideoLAN\5⤵PID:1588
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2644 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2608
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2472 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2008
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2208
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:3020
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:2560
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:2300
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵PID:2744
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
PID:1792
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:2664
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:1252
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1540
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:1776
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Executes dropped EXE
PID:2596
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:1028
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2984 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵PID:736
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵
- Drops file in Program Files directory
PID:856 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\Versions\7⤵PID:2044
-
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:1840
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:900
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:3000
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:2896
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:2712
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1092
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2336 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2592
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:1312
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:1804
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:940
-
-
C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe"C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe" C:\Program Files (x86)\Internet Explorer\it-IT\6⤵PID:1600
-
-
C:\Program Files (x86)\Internet Explorer\ja-JP\backup.exe"C:\Program Files (x86)\Internet Explorer\ja-JP\backup.exe" C:\Program Files (x86)\Internet Explorer\ja-JP\6⤵PID:3040
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2380 -
C:\Program Files (x86)\Microsoft Office\CLIPART\backup.exe"C:\Program Files (x86)\Microsoft Office\CLIPART\backup.exe" C:\Program Files (x86)\Microsoft Office\CLIPART\6⤵PID:616
-
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\update.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\update.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:2144
-
-
-
C:\Users\System Restore.exe"C:\Users\System Restore.exe" C:\Users\4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Drops file in Windows directory
- System policy modification
PID:1348 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:2168
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:2120
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵
- Drops file in Windows directory
PID:1644 -
C:\Windows\AppPatch\AppPatch64\backup.exeC:\Windows\AppPatch\AppPatch64\backup.exe C:\Windows\AppPatch\AppPatch64\6⤵PID:1648
-
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:2668
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:2052
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2572
-
-
C:\Windows\Cursors\update.exeC:\Windows\Cursors\update.exe C:\Windows\Cursors\5⤵PID:2352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000000\3⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000001\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000001\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000001\3⤵
- Modifies visibility of file extensions in Explorer
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000002\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000002\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000002\3⤵PID:524
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000003\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000003\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000003\3⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000004\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000004\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000004\3⤵PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000005\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000005\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000005\3⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\backup.exeC:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\backup.exe C:\Users\Admin\AppData\Local\Temp\lpksetup\lpk-tmp-00000006\3⤵PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
450KB
MD5ca540841195ecbfc83c3a7005cd83e57
SHA1d2fafa4fe2a5dd0e6ba11e23970a4827774f590f
SHA256d0198808568a2aa309c73c96503691b7b7f70826160163d3a35a41f28a156643
SHA5124e9df6f87f496ec5dbc464a31cf954eeba1d36e4efed6dbe7e32a60f967967d0fb957a4ab2711df6308b51544d92fd4c3145caa9823a9b794609be41986243ad
-
Filesize
450KB
MD5b4210cf90b9892313a34d9d7156c8ef0
SHA15fec86b18068a619cfc69a79652a10658b69cf86
SHA2563749c04d9b7075a7041fee04039d6436c2e68083f3173e79caa12d26e57ed700
SHA512e39bab1e4c242fb29c621a645b4f6a409374610178ee31b3149b275fbd5f233e355299dfd996042440e4b473a7d20b7bb663865302a322b1e5fe9653edb19c01
-
Filesize
450KB
MD5b4210cf90b9892313a34d9d7156c8ef0
SHA15fec86b18068a619cfc69a79652a10658b69cf86
SHA2563749c04d9b7075a7041fee04039d6436c2e68083f3173e79caa12d26e57ed700
SHA512e39bab1e4c242fb29c621a645b4f6a409374610178ee31b3149b275fbd5f233e355299dfd996042440e4b473a7d20b7bb663865302a322b1e5fe9653edb19c01
-
Filesize
450KB
MD506aeecbb34d3f86043c11904d96cbdbd
SHA16ba13c10dd32fc447a5e180d7f0b48f87d9e1dfa
SHA256ae4683bd582919325831bcf34c55ca361d1e2756a9e24f33a0ff471da15c9296
SHA512eb0705e72a725bdb2dc55215199f3900626325b3ee0ba3a28b220368bf77add599a0dfc4df7b79b41e6744cec0ebe11946b6c36c76302d4307dea21081b8a21a
-
Filesize
450KB
MD54837f1e9194cd8084ed02337bd77db05
SHA14baa1d548496f548cf94396063f2a24d372366e9
SHA256335e67f4c6515fd1b3003e1326120f9809f6671f777a62a4161fd6de08271934
SHA512cf753fd56f92b7e07a57b2ae67f9616ec53151976cd8b2fde01ff8bb45491722ddef558d6db6355fe00d923c346bc32b3e70e7dafad6e66b7756bb253a5f2254
-
Filesize
450KB
MD54837f1e9194cd8084ed02337bd77db05
SHA14baa1d548496f548cf94396063f2a24d372366e9
SHA256335e67f4c6515fd1b3003e1326120f9809f6671f777a62a4161fd6de08271934
SHA512cf753fd56f92b7e07a57b2ae67f9616ec53151976cd8b2fde01ff8bb45491722ddef558d6db6355fe00d923c346bc32b3e70e7dafad6e66b7756bb253a5f2254
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
450KB
MD5231d6ff8721bba43dfb9598e988c85d9
SHA19c118e1240fcb721c1ed413fe408e1596c38dd72
SHA2566132958d19db3166d809e15b03d8cface44716e1af97c5b3874ebb844bae2020
SHA5122b2ed63f2d39152f6a5952c88e8f7f607ce4190451cd3b9c6bf938c27fb112b467373f592b4caa77e9db842bb91270e7073d5aa5145b7b77c365258871eff37f
-
Filesize
450KB
MD5231d6ff8721bba43dfb9598e988c85d9
SHA19c118e1240fcb721c1ed413fe408e1596c38dd72
SHA2566132958d19db3166d809e15b03d8cface44716e1af97c5b3874ebb844bae2020
SHA5122b2ed63f2d39152f6a5952c88e8f7f607ce4190451cd3b9c6bf938c27fb112b467373f592b4caa77e9db842bb91270e7073d5aa5145b7b77c365258871eff37f
-
Filesize
451KB
MD50bf5247010212e088c8410ea4676b6aa
SHA17d9e193048ee2eb32942019d5c082e26c87063f8
SHA256f5042e3b035a946f69902a04d2d5d25e1c66c261de3b21d8cbb59ab45ea1754b
SHA5127e5337e1ed38598c2dc3997ad91de0755388046859032867a88014aa2d72f65d1dc3c3c93363f4e97fd0973c8a191b4b5b08826986db59a1718da066b594677f
-
Filesize
451KB
MD524fdb73590c31bf86b27d850dc15e6dd
SHA1419ed501f845b2e6f0b6d75630ff5692e938a95f
SHA256b9554c2fb95d78818d774101938c3b8e27b79c4a0d7d2d8d6715b0c5fe5235e9
SHA512a915645af2c449ac414fc56f248548c3432a0fa62dd9db07e26416ec0b1833284147d544bfd8db820d5cb6266c117ae94e1b2f77bdbad8902a1f1eb721caff7b
-
Filesize
451KB
MD524fdb73590c31bf86b27d850dc15e6dd
SHA1419ed501f845b2e6f0b6d75630ff5692e938a95f
SHA256b9554c2fb95d78818d774101938c3b8e27b79c4a0d7d2d8d6715b0c5fe5235e9
SHA512a915645af2c449ac414fc56f248548c3432a0fa62dd9db07e26416ec0b1833284147d544bfd8db820d5cb6266c117ae94e1b2f77bdbad8902a1f1eb721caff7b
-
Filesize
451KB
MD5cb2fc8ed7aa2893e8696d2986142bded
SHA1ffa9b4ddbc7ce6d8a9e99b26064ed23fd21904fe
SHA2567c4a24c203a46138e41238b4df04c3084afd83b136804212d1f57d41a90c6f7a
SHA5120c6fb11bca91820d72ce2760abb526fba6dccba876693be083178216e760f7626c1cbaec828d48e6bac0a84b43ed52840de35d9e183dacbfd6f78b2058dbd12d
-
Filesize
450KB
MD511035d241dc05997f124c51785fafb39
SHA197b7b7e021a70edb3abf7e2794d05b134ff3cea2
SHA2561b718d3bbb79762f7e5cc601ed5f02682b6c26dce3110102f20dd01601c915d6
SHA5120a230deb1cc85e47633cc893ec9d9a8367afd2467e035bbbdda4f2ae90f7462f4d0e72bb59f43545d24c7ec3402eefab9cdaf0c5b2de802eab512fed5255d3af
-
Filesize
450KB
MD511035d241dc05997f124c51785fafb39
SHA197b7b7e021a70edb3abf7e2794d05b134ff3cea2
SHA2561b718d3bbb79762f7e5cc601ed5f02682b6c26dce3110102f20dd01601c915d6
SHA5120a230deb1cc85e47633cc893ec9d9a8367afd2467e035bbbdda4f2ae90f7462f4d0e72bb59f43545d24c7ec3402eefab9cdaf0c5b2de802eab512fed5255d3af
-
Filesize
450KB
MD511b4b0c2d657896ca62e7a6f2b2142d2
SHA1e32f993a459eb02239af28df349ef08254d58807
SHA2568a0020c3f89376ef582f69039906acab0fe596445c534605816a44b2c5b00b32
SHA5123853c2da0c4475c5a5afbbac8ebd0f2a9c23d8f9e1abb5a147beafd8728171dc213a99b028592ba4bd1fafbc6d53b8f9b3e48085d2a68254dcd4760dc2c80572
-
Filesize
450KB
MD511b4b0c2d657896ca62e7a6f2b2142d2
SHA1e32f993a459eb02239af28df349ef08254d58807
SHA2568a0020c3f89376ef582f69039906acab0fe596445c534605816a44b2c5b00b32
SHA5123853c2da0c4475c5a5afbbac8ebd0f2a9c23d8f9e1abb5a147beafd8728171dc213a99b028592ba4bd1fafbc6d53b8f9b3e48085d2a68254dcd4760dc2c80572
-
Filesize
450KB
MD5f55b7cd7328f7970d567097ce35a3f2a
SHA12c997b35d3366a92225b56328a7a8882438da2a0
SHA256975ec779cfdcec4d35167c1564c85e322d8055e4630a5a29deea004664d68373
SHA512c161ae3f7481264a530232beef28e405951cae364ae88456ad889d5274e4837fdc99b6e442cb64da41bacfbc465efda10ed28a1b28fa3569c359a853cb9c4d66
-
Filesize
450KB
MD5f55b7cd7328f7970d567097ce35a3f2a
SHA12c997b35d3366a92225b56328a7a8882438da2a0
SHA256975ec779cfdcec4d35167c1564c85e322d8055e4630a5a29deea004664d68373
SHA512c161ae3f7481264a530232beef28e405951cae364ae88456ad889d5274e4837fdc99b6e442cb64da41bacfbc465efda10ed28a1b28fa3569c359a853cb9c4d66
-
Filesize
450KB
MD5f55b7cd7328f7970d567097ce35a3f2a
SHA12c997b35d3366a92225b56328a7a8882438da2a0
SHA256975ec779cfdcec4d35167c1564c85e322d8055e4630a5a29deea004664d68373
SHA512c161ae3f7481264a530232beef28e405951cae364ae88456ad889d5274e4837fdc99b6e442cb64da41bacfbc465efda10ed28a1b28fa3569c359a853cb9c4d66
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize450KB
MD5c2ad29fe0e8df02d436f409ddf9e33be
SHA141794503f57e9e6a2e2db5e08d27f5b3f46cf849
SHA25679705ea0cba05aec5f95b85f176cd55654085daffb486b97de7d86ae3265aca1
SHA5123d81e9090a20c3c10c4c60c44430f3a511d7e6e9ebc9017b77f016e6100212d7d3a6d4fb06fb09aa3346cac50289fc8d3367ec60fdf21c1a567c704ba8b34937
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
Filesize
450KB
MD52fdb2ccf5187c96350272dac84237bf0
SHA118f710e03f0e3590ba4bfb0414481139d9530c5f
SHA256cb581c40dd96fc3afbb7af894eafe70000a66ec2e5e64fd917ae7c0040f8deac
SHA51267125e62eec68788cc1f41a083b01506ccaca60bc50a8a8ec96b8b1432a3ab3f78d8358ab89a40a784f7baaee2c2ee7e3c1f8e92b882a27c4263246a1359c1b4
-
Filesize
450KB
MD52fdb2ccf5187c96350272dac84237bf0
SHA118f710e03f0e3590ba4bfb0414481139d9530c5f
SHA256cb581c40dd96fc3afbb7af894eafe70000a66ec2e5e64fd917ae7c0040f8deac
SHA51267125e62eec68788cc1f41a083b01506ccaca60bc50a8a8ec96b8b1432a3ab3f78d8358ab89a40a784f7baaee2c2ee7e3c1f8e92b882a27c4263246a1359c1b4
-
Filesize
450KB
MD5b686d2fc082b698ba96136c1042ca568
SHA16c3b73e32a893dc4423c33762de90b530bf34aaa
SHA25604d07174442b29d74c5285fee0c24437e67c238b5bebd74e6802b2ce5dd54e81
SHA5129312fc4bf336eff1e5796cb618b38793f535016de63b6417f0b5230a90a62d7466e10ca72b3053c27d53b2d233e7963b919efe44f22b2e18fd732bc7299f5a2a
-
Filesize
450KB
MD5b686d2fc082b698ba96136c1042ca568
SHA16c3b73e32a893dc4423c33762de90b530bf34aaa
SHA25604d07174442b29d74c5285fee0c24437e67c238b5bebd74e6802b2ce5dd54e81
SHA5129312fc4bf336eff1e5796cb618b38793f535016de63b6417f0b5230a90a62d7466e10ca72b3053c27d53b2d233e7963b919efe44f22b2e18fd732bc7299f5a2a
-
Filesize
450KB
MD5ca540841195ecbfc83c3a7005cd83e57
SHA1d2fafa4fe2a5dd0e6ba11e23970a4827774f590f
SHA256d0198808568a2aa309c73c96503691b7b7f70826160163d3a35a41f28a156643
SHA5124e9df6f87f496ec5dbc464a31cf954eeba1d36e4efed6dbe7e32a60f967967d0fb957a4ab2711df6308b51544d92fd4c3145caa9823a9b794609be41986243ad
-
Filesize
450KB
MD5ca540841195ecbfc83c3a7005cd83e57
SHA1d2fafa4fe2a5dd0e6ba11e23970a4827774f590f
SHA256d0198808568a2aa309c73c96503691b7b7f70826160163d3a35a41f28a156643
SHA5124e9df6f87f496ec5dbc464a31cf954eeba1d36e4efed6dbe7e32a60f967967d0fb957a4ab2711df6308b51544d92fd4c3145caa9823a9b794609be41986243ad
-
Filesize
450KB
MD5b4210cf90b9892313a34d9d7156c8ef0
SHA15fec86b18068a619cfc69a79652a10658b69cf86
SHA2563749c04d9b7075a7041fee04039d6436c2e68083f3173e79caa12d26e57ed700
SHA512e39bab1e4c242fb29c621a645b4f6a409374610178ee31b3149b275fbd5f233e355299dfd996042440e4b473a7d20b7bb663865302a322b1e5fe9653edb19c01
-
Filesize
450KB
MD5b4210cf90b9892313a34d9d7156c8ef0
SHA15fec86b18068a619cfc69a79652a10658b69cf86
SHA2563749c04d9b7075a7041fee04039d6436c2e68083f3173e79caa12d26e57ed700
SHA512e39bab1e4c242fb29c621a645b4f6a409374610178ee31b3149b275fbd5f233e355299dfd996042440e4b473a7d20b7bb663865302a322b1e5fe9653edb19c01
-
Filesize
450KB
MD506aeecbb34d3f86043c11904d96cbdbd
SHA16ba13c10dd32fc447a5e180d7f0b48f87d9e1dfa
SHA256ae4683bd582919325831bcf34c55ca361d1e2756a9e24f33a0ff471da15c9296
SHA512eb0705e72a725bdb2dc55215199f3900626325b3ee0ba3a28b220368bf77add599a0dfc4df7b79b41e6744cec0ebe11946b6c36c76302d4307dea21081b8a21a
-
Filesize
450KB
MD506aeecbb34d3f86043c11904d96cbdbd
SHA16ba13c10dd32fc447a5e180d7f0b48f87d9e1dfa
SHA256ae4683bd582919325831bcf34c55ca361d1e2756a9e24f33a0ff471da15c9296
SHA512eb0705e72a725bdb2dc55215199f3900626325b3ee0ba3a28b220368bf77add599a0dfc4df7b79b41e6744cec0ebe11946b6c36c76302d4307dea21081b8a21a
-
Filesize
450KB
MD54837f1e9194cd8084ed02337bd77db05
SHA14baa1d548496f548cf94396063f2a24d372366e9
SHA256335e67f4c6515fd1b3003e1326120f9809f6671f777a62a4161fd6de08271934
SHA512cf753fd56f92b7e07a57b2ae67f9616ec53151976cd8b2fde01ff8bb45491722ddef558d6db6355fe00d923c346bc32b3e70e7dafad6e66b7756bb253a5f2254
-
Filesize
450KB
MD54837f1e9194cd8084ed02337bd77db05
SHA14baa1d548496f548cf94396063f2a24d372366e9
SHA256335e67f4c6515fd1b3003e1326120f9809f6671f777a62a4161fd6de08271934
SHA512cf753fd56f92b7e07a57b2ae67f9616ec53151976cd8b2fde01ff8bb45491722ddef558d6db6355fe00d923c346bc32b3e70e7dafad6e66b7756bb253a5f2254
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
451KB
MD5882ef7bf86b8e741644f656237da0f81
SHA1915e875b8fe3e733824da974db8579bb6287520f
SHA25652e35fa355954aec368a0f2627c3053b89e80028a2e4fb3697b94b78fac23f37
SHA512d5a62318ef05e536ac721347e5d9e97aae106cf6f0f0ae7f7a3744864b0eb1b69b5002efd90889f5d34f18b794e0e59ec09ce33e05980db2cb393efa15d9791d
-
Filesize
450KB
MD5231d6ff8721bba43dfb9598e988c85d9
SHA19c118e1240fcb721c1ed413fe408e1596c38dd72
SHA2566132958d19db3166d809e15b03d8cface44716e1af97c5b3874ebb844bae2020
SHA5122b2ed63f2d39152f6a5952c88e8f7f607ce4190451cd3b9c6bf938c27fb112b467373f592b4caa77e9db842bb91270e7073d5aa5145b7b77c365258871eff37f
-
Filesize
450KB
MD5231d6ff8721bba43dfb9598e988c85d9
SHA19c118e1240fcb721c1ed413fe408e1596c38dd72
SHA2566132958d19db3166d809e15b03d8cface44716e1af97c5b3874ebb844bae2020
SHA5122b2ed63f2d39152f6a5952c88e8f7f607ce4190451cd3b9c6bf938c27fb112b467373f592b4caa77e9db842bb91270e7073d5aa5145b7b77c365258871eff37f
-
Filesize
451KB
MD50bf5247010212e088c8410ea4676b6aa
SHA17d9e193048ee2eb32942019d5c082e26c87063f8
SHA256f5042e3b035a946f69902a04d2d5d25e1c66c261de3b21d8cbb59ab45ea1754b
SHA5127e5337e1ed38598c2dc3997ad91de0755388046859032867a88014aa2d72f65d1dc3c3c93363f4e97fd0973c8a191b4b5b08826986db59a1718da066b594677f
-
Filesize
451KB
MD50bf5247010212e088c8410ea4676b6aa
SHA17d9e193048ee2eb32942019d5c082e26c87063f8
SHA256f5042e3b035a946f69902a04d2d5d25e1c66c261de3b21d8cbb59ab45ea1754b
SHA5127e5337e1ed38598c2dc3997ad91de0755388046859032867a88014aa2d72f65d1dc3c3c93363f4e97fd0973c8a191b4b5b08826986db59a1718da066b594677f
-
Filesize
451KB
MD524fdb73590c31bf86b27d850dc15e6dd
SHA1419ed501f845b2e6f0b6d75630ff5692e938a95f
SHA256b9554c2fb95d78818d774101938c3b8e27b79c4a0d7d2d8d6715b0c5fe5235e9
SHA512a915645af2c449ac414fc56f248548c3432a0fa62dd9db07e26416ec0b1833284147d544bfd8db820d5cb6266c117ae94e1b2f77bdbad8902a1f1eb721caff7b
-
Filesize
451KB
MD524fdb73590c31bf86b27d850dc15e6dd
SHA1419ed501f845b2e6f0b6d75630ff5692e938a95f
SHA256b9554c2fb95d78818d774101938c3b8e27b79c4a0d7d2d8d6715b0c5fe5235e9
SHA512a915645af2c449ac414fc56f248548c3432a0fa62dd9db07e26416ec0b1833284147d544bfd8db820d5cb6266c117ae94e1b2f77bdbad8902a1f1eb721caff7b
-
Filesize
451KB
MD5cb2fc8ed7aa2893e8696d2986142bded
SHA1ffa9b4ddbc7ce6d8a9e99b26064ed23fd21904fe
SHA2567c4a24c203a46138e41238b4df04c3084afd83b136804212d1f57d41a90c6f7a
SHA5120c6fb11bca91820d72ce2760abb526fba6dccba876693be083178216e760f7626c1cbaec828d48e6bac0a84b43ed52840de35d9e183dacbfd6f78b2058dbd12d
-
Filesize
451KB
MD5cb2fc8ed7aa2893e8696d2986142bded
SHA1ffa9b4ddbc7ce6d8a9e99b26064ed23fd21904fe
SHA2567c4a24c203a46138e41238b4df04c3084afd83b136804212d1f57d41a90c6f7a
SHA5120c6fb11bca91820d72ce2760abb526fba6dccba876693be083178216e760f7626c1cbaec828d48e6bac0a84b43ed52840de35d9e183dacbfd6f78b2058dbd12d
-
Filesize
450KB
MD511035d241dc05997f124c51785fafb39
SHA197b7b7e021a70edb3abf7e2794d05b134ff3cea2
SHA2561b718d3bbb79762f7e5cc601ed5f02682b6c26dce3110102f20dd01601c915d6
SHA5120a230deb1cc85e47633cc893ec9d9a8367afd2467e035bbbdda4f2ae90f7462f4d0e72bb59f43545d24c7ec3402eefab9cdaf0c5b2de802eab512fed5255d3af
-
Filesize
450KB
MD511035d241dc05997f124c51785fafb39
SHA197b7b7e021a70edb3abf7e2794d05b134ff3cea2
SHA2561b718d3bbb79762f7e5cc601ed5f02682b6c26dce3110102f20dd01601c915d6
SHA5120a230deb1cc85e47633cc893ec9d9a8367afd2467e035bbbdda4f2ae90f7462f4d0e72bb59f43545d24c7ec3402eefab9cdaf0c5b2de802eab512fed5255d3af
-
Filesize
450KB
MD511b4b0c2d657896ca62e7a6f2b2142d2
SHA1e32f993a459eb02239af28df349ef08254d58807
SHA2568a0020c3f89376ef582f69039906acab0fe596445c534605816a44b2c5b00b32
SHA5123853c2da0c4475c5a5afbbac8ebd0f2a9c23d8f9e1abb5a147beafd8728171dc213a99b028592ba4bd1fafbc6d53b8f9b3e48085d2a68254dcd4760dc2c80572
-
Filesize
450KB
MD511b4b0c2d657896ca62e7a6f2b2142d2
SHA1e32f993a459eb02239af28df349ef08254d58807
SHA2568a0020c3f89376ef582f69039906acab0fe596445c534605816a44b2c5b00b32
SHA5123853c2da0c4475c5a5afbbac8ebd0f2a9c23d8f9e1abb5a147beafd8728171dc213a99b028592ba4bd1fafbc6d53b8f9b3e48085d2a68254dcd4760dc2c80572
-
Filesize
450KB
MD5f55b7cd7328f7970d567097ce35a3f2a
SHA12c997b35d3366a92225b56328a7a8882438da2a0
SHA256975ec779cfdcec4d35167c1564c85e322d8055e4630a5a29deea004664d68373
SHA512c161ae3f7481264a530232beef28e405951cae364ae88456ad889d5274e4837fdc99b6e442cb64da41bacfbc465efda10ed28a1b28fa3569c359a853cb9c4d66
-
Filesize
450KB
MD5f55b7cd7328f7970d567097ce35a3f2a
SHA12c997b35d3366a92225b56328a7a8882438da2a0
SHA256975ec779cfdcec4d35167c1564c85e322d8055e4630a5a29deea004664d68373
SHA512c161ae3f7481264a530232beef28e405951cae364ae88456ad889d5274e4837fdc99b6e442cb64da41bacfbc465efda10ed28a1b28fa3569c359a853cb9c4d66
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize450KB
MD5c2ad29fe0e8df02d436f409ddf9e33be
SHA141794503f57e9e6a2e2db5e08d27f5b3f46cf849
SHA25679705ea0cba05aec5f95b85f176cd55654085daffb486b97de7d86ae3265aca1
SHA5123d81e9090a20c3c10c4c60c44430f3a511d7e6e9ebc9017b77f016e6100212d7d3a6d4fb06fb09aa3346cac50289fc8d3367ec60fdf21c1a567c704ba8b34937
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize450KB
MD5c2ad29fe0e8df02d436f409ddf9e33be
SHA141794503f57e9e6a2e2db5e08d27f5b3f46cf849
SHA25679705ea0cba05aec5f95b85f176cd55654085daffb486b97de7d86ae3265aca1
SHA5123d81e9090a20c3c10c4c60c44430f3a511d7e6e9ebc9017b77f016e6100212d7d3a6d4fb06fb09aa3346cac50289fc8d3367ec60fdf21c1a567c704ba8b34937
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize450KB
MD5251d602771e62159da5490704ba49867
SHA10cf31278affa00d34ad0436f3184a815a287336f
SHA25683ddf7603b1f6625cdee64419e35b64b048986b080f6f0ea92af7cd7ddabc139
SHA51285027ed00142391707f6e548b2068e5c28f2a6d580bf566a8e2b302a35855c0d028888fae3130f0f0f2e4e6694b772e3db544dd09312394710e19d594f21ba41
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize450KB
MD5251d602771e62159da5490704ba49867
SHA10cf31278affa00d34ad0436f3184a815a287336f
SHA25683ddf7603b1f6625cdee64419e35b64b048986b080f6f0ea92af7cd7ddabc139
SHA51285027ed00142391707f6e548b2068e5c28f2a6d580bf566a8e2b302a35855c0d028888fae3130f0f0f2e4e6694b772e3db544dd09312394710e19d594f21ba41
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
Filesize
450KB
MD5e46bd7c2943f3713bb65e6c5977a7fe5
SHA112f3798f18cc6bef0e7f88a3615f20254541e022
SHA2566d18da5ffe82c2f0c7340c4a5ff338d962b4cb1eeda6d04d3df0137d32c5c645
SHA512300eb5567bcfd490026b679bf668c937d76f3f6a65b06e2c88ed77c93446d09d296df16aac28d7839601036f4792b70220fbfee62f02b3e857e6f1e81309d784
-
Filesize
450KB
MD52fdb2ccf5187c96350272dac84237bf0
SHA118f710e03f0e3590ba4bfb0414481139d9530c5f
SHA256cb581c40dd96fc3afbb7af894eafe70000a66ec2e5e64fd917ae7c0040f8deac
SHA51267125e62eec68788cc1f41a083b01506ccaca60bc50a8a8ec96b8b1432a3ab3f78d8358ab89a40a784f7baaee2c2ee7e3c1f8e92b882a27c4263246a1359c1b4
-
Filesize
450KB
MD52fdb2ccf5187c96350272dac84237bf0
SHA118f710e03f0e3590ba4bfb0414481139d9530c5f
SHA256cb581c40dd96fc3afbb7af894eafe70000a66ec2e5e64fd917ae7c0040f8deac
SHA51267125e62eec68788cc1f41a083b01506ccaca60bc50a8a8ec96b8b1432a3ab3f78d8358ab89a40a784f7baaee2c2ee7e3c1f8e92b882a27c4263246a1359c1b4
-
Filesize
450KB
MD5ad74082a91dff1ebdfff1a02632199c6
SHA114d88890e7f8c3432bdb030792b88d0d23da9009
SHA25602f874fe0493f6a4110139dc7112971b7d4bf114c966b78b8cd2e5a1f28d4609
SHA51272d19a708cc87cb43d695e3c18782af784cda8d21398f5bc56a8d13354cf55efb16d2701bc76287590b42c32301216d1ec8d9619cff9229861677a7b1bc16952