Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
02/11/2023, 15:33
Behavioral task
behavioral1
Sample
NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe
-
Size
122KB
-
MD5
6c72e7969e5886413e918e8db55c6570
-
SHA1
e9d3b8f0d761bf99d57fa922e5869a2a00035f0c
-
SHA256
a88521fbeea8b63062d0134e970bdb92995dae8bec9a977a38eaa0c676869449
-
SHA512
23de6cde018f6949ca602cdde37343d168d00a0f2a4bf54c75a8750d49e49c72207c3755992f1b25e20ab1306fd4ec1e10e1fbd71d58861dceb8889442c3015d
-
SSDEEP
1536:lvm1Fu8AjYaFwjRUdW7fmyY7aZYJVmy0KQbj6vbjuKoauGi4p:6u8ANCUdgfmD7zey0KUj6TjR9i4p
Malware Config
Signatures
-
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2940-0-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000015586-5.dat family_berbew behavioral1/files/0x001b000000015586-10.dat family_berbew behavioral1/files/0x001b000000015586-8.dat family_berbew behavioral1/memory/2940-7-0x00000000003B0000-0x00000000003D4000-memory.dmp family_berbew behavioral1/memory/2092-14-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000015586-13.dat family_berbew behavioral1/files/0x0007000000015c22-20.dat family_berbew behavioral1/files/0x0007000000015c22-18.dat family_berbew behavioral1/files/0x0007000000015c22-24.dat family_berbew behavioral1/memory/2164-29-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0007000000015c47-36.dat family_berbew behavioral1/files/0x0007000000015c47-32.dat family_berbew behavioral1/files/0x0007000000015c47-30.dat family_berbew behavioral1/files/0x0008000000015c30-40.dat family_berbew behavioral1/files/0x0008000000015c30-46.dat family_berbew behavioral1/files/0x0008000000015c30-42.dat family_berbew behavioral1/memory/2940-47-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2724-51-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0008000000015c5f-52.dat family_berbew behavioral1/memory/2092-58-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0008000000015c5f-54.dat family_berbew behavioral1/files/0x0008000000015c5f-59.dat family_berbew behavioral1/memory/2060-63-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0006000000015ca0-70.dat family_berbew behavioral1/files/0x0006000000015ca0-66.dat family_berbew behavioral1/files/0x0006000000015ca0-64.dat family_berbew behavioral1/memory/2524-71-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2524-74-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0006000000015ca9-76.dat family_berbew behavioral1/files/0x0006000000015ca9-78.dat family_berbew behavioral1/files/0x0006000000015ca9-83.dat family_berbew behavioral1/memory/2940-84-0x00000000003B0000-0x00000000003D4000-memory.dmp family_berbew behavioral1/memory/2144-82-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2608-87-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000015586-89.dat family_berbew behavioral1/memory/2092-98-0x0000000000430000-0x0000000000454000-memory.dmp family_berbew behavioral1/files/0x0006000000015cc9-97.dat family_berbew behavioral1/files/0x0006000000015cc9-101.dat family_berbew behavioral1/files/0x0006000000015dc0-103.dat family_berbew behavioral1/memory/1204-110-0x00000000002A0000-0x00000000002C4000-memory.dmp family_berbew behavioral1/files/0x0006000000015dc0-109.dat family_berbew behavioral1/files/0x0006000000015dc0-105.dat family_berbew behavioral1/files/0x0006000000015dc0-125.dat family_berbew behavioral1/files/0x0007000000015e35-127.dat family_berbew behavioral1/files/0x0007000000015e35-129.dat family_berbew behavioral1/files/0x0007000000015e35-133.dat family_berbew behavioral1/memory/1584-138-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0006000000015eba-141.dat family_berbew behavioral1/files/0x0006000000015eba-145.dat family_berbew behavioral1/files/0x0006000000015eba-139.dat family_berbew behavioral1/memory/2152-137-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0006000000015eba-148.dat family_berbew behavioral1/files/0x0007000000015ea6-150.dat family_berbew behavioral1/files/0x0007000000015ea6-152.dat family_berbew behavioral1/files/0x0007000000015ea6-157.dat family_berbew behavioral1/memory/1204-156-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/1204-159-0x00000000002A0000-0x00000000002C4000-memory.dmp family_berbew behavioral1/files/0x0007000000015ea6-161.dat family_berbew behavioral1/files/0x0006000000016058-163.dat family_berbew behavioral1/files/0x0006000000016058-170.dat family_berbew behavioral1/files/0x0006000000016058-166.dat family_berbew behavioral1/memory/2800-172-0x0000000000300000-0x0000000000324000-memory.dmp family_berbew behavioral1/files/0x0007000000016050-180.dat family_berbew -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe -
Executes dropped EXE 64 IoCs
pid Process 2092 backup.exe 2164 backup.exe 2144 backup.exe 2724 backup.exe 2060 backup.exe 2524 backup.exe 2608 backup.exe 1204 backup.exe 1584 backup.exe 2152 backup.exe 2472 data.exe 2800 backup.exe 1644 backup.exe 760 backup.exe 2536 data.exe 1720 data.exe 1112 backup.exe 824 backup.exe 1068 backup.exe 2904 backup.exe 596 backup.exe 2316 backup.exe 2272 data.exe 2252 backup.exe 876 backup.exe 1960 System Restore.exe 1716 backup.exe 1216 update.exe 2160 backup.exe 3048 backup.exe 2640 backup.exe 2696 backup.exe 2744 backup.exe 2532 backup.exe 2544 backup.exe 2740 backup.exe 2480 backup.exe 2788 backup.exe 2240 backup.exe 2184 backup.exe 1584 backup.exe 852 backup.exe 528 backup.exe 1648 backup.exe 376 backup.exe 476 backup.exe 2264 backup.exe 2308 backup.exe 1952 backup.exe 2312 backup.exe 896 backup.exe 2556 backup.exe 1560 backup.exe 1592 backup.exe 1616 backup.exe 560 backup.exe 1548 backup.exe 3056 backup.exe 3036 backup.exe 1520 backup.exe 2244 backup.exe 1612 backup.exe 2388 backup.exe 2776 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 1204 backup.exe 1204 backup.exe 1584 backup.exe 1584 backup.exe 1204 backup.exe 1204 backup.exe 2472 data.exe 2472 data.exe 2800 backup.exe 2800 backup.exe 2472 data.exe 2472 data.exe 760 backup.exe 760 backup.exe 2536 data.exe 2536 data.exe 2536 data.exe 2536 data.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1112 backup.exe 1216 update.exe 1216 update.exe 1216 update.exe 1112 backup.exe 1112 backup.exe 2160 backup.exe 2160 backup.exe 2160 backup.exe 2160 backup.exe 2160 backup.exe 2160 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe data.exe File opened for modification C:\Program Files\7-Zip\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Mozilla Firefox\backup.exe data.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\en-US\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe data.exe File opened for modification C:\Program Files\DVD Maker\es-ES\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe data.exe File opened for modification C:\Program Files\Common Files\System\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\VideoLAN\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\es-ES\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe backup.exe File opened for modification C:\Program Files\Java\jre7\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe data.exe File opened for modification C:\Program Files\Internet Explorer\backup.exe data.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe backup.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\AppCompat\backup.exe backup.exe File opened for modification C:\Windows\Boot\backup.exe backup.exe File opened for modification C:\Windows\CSC\backup.exe backup.exe File opened for modification C:\Windows\debug\backup.exe backup.exe File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe File opened for modification C:\Windows\Branding\backup.exe backup.exe File opened for modification C:\Windows\Cursors\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 2092 backup.exe 2164 backup.exe 2144 backup.exe 2724 backup.exe 2060 backup.exe 2524 backup.exe 2608 backup.exe 1204 backup.exe 1584 backup.exe 2152 backup.exe 2472 data.exe 2800 backup.exe 1644 backup.exe 760 backup.exe 2536 data.exe 1720 data.exe 1112 backup.exe 824 backup.exe 1068 backup.exe 2904 backup.exe 596 backup.exe 2316 backup.exe 2272 data.exe 2252 backup.exe 876 backup.exe 1960 System Restore.exe 1716 backup.exe 1216 update.exe 2160 backup.exe 3048 backup.exe 2640 backup.exe 2696 backup.exe 2744 backup.exe 2532 backup.exe 2544 backup.exe 2740 backup.exe 2480 backup.exe 2788 backup.exe 2240 backup.exe 2184 backup.exe 1584 backup.exe 852 backup.exe 528 backup.exe 1648 backup.exe 376 backup.exe 476 backup.exe 2264 backup.exe 2308 backup.exe 1952 backup.exe 2312 backup.exe 896 backup.exe 2556 backup.exe 1560 backup.exe 1592 backup.exe 1616 backup.exe 560 backup.exe 1548 backup.exe 3056 backup.exe 3036 backup.exe 1520 backup.exe 2244 backup.exe 1612 backup.exe 2388 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2092 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 28 PID 2940 wrote to memory of 2092 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 28 PID 2940 wrote to memory of 2092 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 28 PID 2940 wrote to memory of 2092 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 28 PID 2940 wrote to memory of 2164 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 29 PID 2940 wrote to memory of 2164 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 29 PID 2940 wrote to memory of 2164 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 29 PID 2940 wrote to memory of 2164 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 29 PID 2940 wrote to memory of 2144 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 30 PID 2940 wrote to memory of 2144 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 30 PID 2940 wrote to memory of 2144 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 30 PID 2940 wrote to memory of 2144 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 30 PID 2940 wrote to memory of 2724 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 31 PID 2940 wrote to memory of 2724 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 31 PID 2940 wrote to memory of 2724 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 31 PID 2940 wrote to memory of 2724 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 31 PID 2940 wrote to memory of 2060 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 32 PID 2940 wrote to memory of 2060 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 32 PID 2940 wrote to memory of 2060 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 32 PID 2940 wrote to memory of 2060 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 32 PID 2940 wrote to memory of 2524 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 33 PID 2940 wrote to memory of 2524 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 33 PID 2940 wrote to memory of 2524 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 33 PID 2940 wrote to memory of 2524 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 33 PID 2940 wrote to memory of 2608 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 34 PID 2940 wrote to memory of 2608 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 34 PID 2940 wrote to memory of 2608 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 34 PID 2940 wrote to memory of 2608 2940 NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe 34 PID 2092 wrote to memory of 1204 2092 backup.exe 35 PID 2092 wrote to memory of 1204 2092 backup.exe 35 PID 2092 wrote to memory of 1204 2092 backup.exe 35 PID 2092 wrote to memory of 1204 2092 backup.exe 35 PID 1204 wrote to memory of 1584 1204 backup.exe 36 PID 1204 wrote to memory of 1584 1204 backup.exe 36 PID 1204 wrote to memory of 1584 1204 backup.exe 36 PID 1204 wrote to memory of 1584 1204 backup.exe 36 PID 1584 wrote to memory of 2152 1584 backup.exe 37 PID 1584 wrote to memory of 2152 1584 backup.exe 37 PID 1584 wrote to memory of 2152 1584 backup.exe 37 PID 1584 wrote to memory of 2152 1584 backup.exe 37 PID 1204 wrote to memory of 2472 1204 backup.exe 38 PID 1204 wrote to memory of 2472 1204 backup.exe 38 PID 1204 wrote to memory of 2472 1204 backup.exe 38 PID 1204 wrote to memory of 2472 1204 backup.exe 38 PID 2472 wrote to memory of 2800 2472 data.exe 39 PID 2472 wrote to memory of 2800 2472 data.exe 39 PID 2472 wrote to memory of 2800 2472 data.exe 39 PID 2472 wrote to memory of 2800 2472 data.exe 39 PID 2800 wrote to memory of 1644 2800 backup.exe 40 PID 2800 wrote to memory of 1644 2800 backup.exe 40 PID 2800 wrote to memory of 1644 2800 backup.exe 40 PID 2800 wrote to memory of 1644 2800 backup.exe 40 PID 2472 wrote to memory of 760 2472 data.exe 41 PID 2472 wrote to memory of 760 2472 data.exe 41 PID 2472 wrote to memory of 760 2472 data.exe 41 PID 2472 wrote to memory of 760 2472 data.exe 41 PID 760 wrote to memory of 2536 760 backup.exe 42 PID 760 wrote to memory of 2536 760 backup.exe 42 PID 760 wrote to memory of 2536 760 backup.exe 42 PID 760 wrote to memory of 2536 760 backup.exe 42 PID 2536 wrote to memory of 1720 2536 data.exe 43 PID 2536 wrote to memory of 1720 2536 data.exe 43 PID 2536 wrote to memory of 1720 2536 data.exe 43 PID 2536 wrote to memory of 1720 2536 data.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6c72e7969e5886413e918e8db55c6570_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\4085126566\backup.exeC:\Users\Admin\AppData\Local\Temp\4085126566\backup.exe C:\Users\Admin\AppData\Local\Temp\4085126566\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1584 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2152
-
-
-
C:\Program Files\data.exe"C:\Program Files\data.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2800 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1644
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:760 -
C:\Program Files\Common Files\Microsoft Shared\data.exe"C:\Program Files\Common Files\Microsoft Shared\data.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2536 -
C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\data.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2252
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:876
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1216
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2160 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2696
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2788
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2184
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:852
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:528
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1648
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:376
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:476
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2264
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2312
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:896
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2556
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1592
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1616
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2244
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2388
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:2776 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:2624
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1228
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- System policy modification
PID:2648
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- System policy modification
PID:2748
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:2060
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3000
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2540 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵
- Modifies visibility of file extensions in Explorer
PID:2476
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Modifies visibility of file extensions in Explorer
PID:2784
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- System policy modification
PID:1756
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2024 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:1828
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2436
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
PID:2432
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\8⤵PID:2276
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:1804
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2148 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:1484
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\data.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\data.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2388
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2404
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\8⤵PID:2432
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\8⤵PID:560
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\8⤵
- System policy modification
PID:3028
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
PID:1536
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:1516
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- System policy modification
PID:836
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:1872
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2216
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:2656
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Drops file in Program Files directory
PID:1952 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:764
-
-
C:\Program Files\DVD Maker\en-US\update.exe"C:\Program Files\DVD Maker\en-US\update.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
PID:2992
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:1072
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
PID:2560
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵
- Modifies visibility of file extensions in Explorer
PID:988
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1932
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:3036
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
PID:2548 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1300
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1452 -
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:2664
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:2240
-
-
C:\Program Files\Internet Explorer\es-ES\update.exe"C:\Program Files\Internet Explorer\es-ES\update.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:2856
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1328
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:1948
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2864
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵
- Drops file in Program Files directory
PID:2024 -
C:\Program Files\Java\jdk1.7.0_80\data.exe"C:\Program Files\Java\jdk1.7.0_80\data.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:2336
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:3008
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:1820
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1920
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2168
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:1656
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:2576
-
-
C:\Program Files\VideoLAN\backup.exe"C:\Program Files\VideoLAN\backup.exe" C:\Program Files\VideoLAN\5⤵PID:2908
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Drops file in Program Files directory
PID:2140 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:888 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2636 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- Modifies visibility of file extensions in Explorer
PID:1364
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵PID:1996
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Drops file in Program Files directory
PID:1616 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵PID:3068
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:304
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2364
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:2160
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:2884
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1852 -
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:2728
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:328
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:2256
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
PID:292 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1708
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵PID:2724
-
-
C:\Users\Admin\Desktop\backup.exeC:\Users\Admin\Desktop\backup.exe C:\Users\Admin\Desktop\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2012
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:2264
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:1548
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:2712
-
-
C:\Users\Admin\Links\update.exeC:\Users\Admin\Links\update.exe C:\Users\Admin\Links\6⤵PID:2404
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1684
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:1860
-
-
C:\Users\Admin\Saved Games\backup.exe"C:\Users\Admin\Saved Games\backup.exe" C:\Users\Admin\Saved Games\6⤵PID:2076
-
-
C:\Users\Admin\Searches\data.exeC:\Users\Admin\Searches\data.exe C:\Users\Admin\Searches\6⤵PID:2456
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵
- Modifies visibility of file extensions in Explorer
PID:1976 -
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵
- System policy modification
PID:1540
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵
- Modifies visibility of file extensions in Explorer
PID:2916
-
-
C:\Users\Public\Music\backup.exeC:\Users\Public\Music\backup.exe C:\Users\Public\Music\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2288 -
C:\Users\Public\Music\Sample Music\backup.exe"C:\Users\Public\Music\Sample Music\backup.exe" C:\Users\Public\Music\Sample Music\7⤵PID:624
-
-
-
C:\Users\Public\Pictures\data.exeC:\Users\Public\Pictures\data.exe C:\Users\Public\Pictures\6⤵PID:2964
-
-
C:\Users\Public\Recorded TV\System Restore.exe"C:\Users\Public\Recorded TV\System Restore.exe" C:\Users\Public\Recorded TV\6⤵PID:2980
-
-
C:\Users\Public\Videos\backup.exeC:\Users\Public\Videos\backup.exe C:\Users\Public\Videos\6⤵PID:1244
-
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Drops file in Windows directory
- System policy modification
PID:2592 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1508
-
-
C:\Windows\AppCompat\backup.exeC:\Windows\AppCompat\backup.exe C:\Windows\AppCompat\5⤵PID:1752
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:2624
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:2496
-
-
C:\Windows\Branding\backup.exeC:\Windows\Branding\backup.exe C:\Windows\Branding\5⤵PID:1828
-
-
C:\Windows\CSC\backup.exeC:\Windows\CSC\backup.exe C:\Windows\CSC\5⤵PID:2144
-
-
C:\Windows\Cursors\backup.exeC:\Windows\Cursors\backup.exe C:\Windows\Cursors\5⤵PID:904
-
-
C:\Windows\debug\backup.exeC:\Windows\debug\backup.exe C:\Windows\debug\5⤵PID:1764
-
-
C:\Windows\de-DE\backup.exeC:\Windows\de-DE\backup.exe C:\Windows\de-DE\5⤵PID:1316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD524b4502d9bf2cd63704b5166bc5e1593
SHA1e07234a84f3af4cc698a4af614213315d267c75e
SHA2568c3bf2381eebbe95dbc9ef04f5facdd9e6d02d4493ff799f846cd6acb1314c86
SHA5122c3c492043445a97e4f2bfbc6bc85e5324d55abbf91fefd92ec2a73ede6a559ec9a8114329884d3545b90ed37c9ab2386d32750e63d444b18ee07747e4c5e3bf
-
Filesize
122KB
MD5f5cce3275dcae289f15785ba7b73c565
SHA16c6f213ff9558b561f3de0259ead4bdf0138df90
SHA256f535ab144a164905fef67b861160c5c80ad2eaa93ea8a94650e3442f0380176f
SHA512af1bf276e8ff450a83b2aa43aaecd644ba7d095492f0015d19f09c0afac882e36696d529cbb0f221f7e0b1483a368d0235ffbd663b135829c8c316eaacda590b
-
Filesize
122KB
MD5f5cce3275dcae289f15785ba7b73c565
SHA16c6f213ff9558b561f3de0259ead4bdf0138df90
SHA256f535ab144a164905fef67b861160c5c80ad2eaa93ea8a94650e3442f0380176f
SHA512af1bf276e8ff450a83b2aa43aaecd644ba7d095492f0015d19f09c0afac882e36696d529cbb0f221f7e0b1483a368d0235ffbd663b135829c8c316eaacda590b
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5755bbb6383b4d00d04449b154b3b8cba
SHA189abd5ee4dcf52e41068ec2f02e65b35a3b9519c
SHA2564df6bc6cd84c202ac49748bc855998a69ef2b84685d13b35b9c3d913159bbfcc
SHA51228280879cba7af19ddb02e974873065cb7d4b621a193c259f0e2759bec9c0b34c79649aa7b747537e8dd022c231f5b748b8d459ee6d5716e21320b1b44f6ff17
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD531076f3c67507fd66ebbe58cb087f7cd
SHA151404b9773973ad7d266b482829bcb06d9abf2ed
SHA25689168033c3a6a85490f0a6fee4a0f4e9937e3a673b882599439e76c4b7458ccb
SHA5124426ad8ede21ff3700af476359c50791e94ed3c58b48db43481e38c9d54326d2e82a43bd7e1fa66d6ff7cf710f90f4ff24a96867cf4fcac0d3ff4a81073a382e
-
Filesize
122KB
MD531076f3c67507fd66ebbe58cb087f7cd
SHA151404b9773973ad7d266b482829bcb06d9abf2ed
SHA25689168033c3a6a85490f0a6fee4a0f4e9937e3a673b882599439e76c4b7458ccb
SHA5124426ad8ede21ff3700af476359c50791e94ed3c58b48db43481e38c9d54326d2e82a43bd7e1fa66d6ff7cf710f90f4ff24a96867cf4fcac0d3ff4a81073a382e
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5727872214157562ece26ed8a0bb8edcc
SHA12a831ee9254ddbf20028a653e6223c210f7f8eff
SHA2562820c4420ea6b73749a03dbaaad61322cb34be66d14190a5d5d66c6c88b0cfc5
SHA512a8fb9efb352b25ca8aa5a14efb5e2b74128d52cf6b93a736bf27e1cdbf39891af147a655a02162313358d07da7ef67c7bcf0f36e7458c832243a05208b83827e
-
Filesize
122KB
MD5727872214157562ece26ed8a0bb8edcc
SHA12a831ee9254ddbf20028a653e6223c210f7f8eff
SHA2562820c4420ea6b73749a03dbaaad61322cb34be66d14190a5d5d66c6c88b0cfc5
SHA512a8fb9efb352b25ca8aa5a14efb5e2b74128d52cf6b93a736bf27e1cdbf39891af147a655a02162313358d07da7ef67c7bcf0f36e7458c832243a05208b83827e
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852
-
Filesize
40KB
MD5a7ceda72f63e1b47f31bfa9b93b9d841
SHA1068c112497c7c784276c0bda4b33d984aa813590
SHA256ab6b0400619c75be900a8fdb68c1452f917be48b7beec4fd9fd4c3a23b55317a
SHA5122c135e65b1757350d35e349d7580ca617393d1e25e29de91cea8988fb9c3f9f3260d6a78c46668228e5f95c4ea82b2dd34012fde27354945dccfe7908dace63f
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
122KB
MD5216da5c2569c5f30731adb71b9c4cc3a
SHA1afa08f97b8180893d4ec4a99cbfc5128170c7f8e
SHA2566f13dfb9d132d072e941d8f3f7660004dc10aa6cb2680d80dadedb54aab59717
SHA5128c167a07bd74225d5a7c56840b98c2798bb841426936a9f4d9ad4053090f0c05f17755b0da075aa88782f13114cac9eb9801ba58cfde75a7f1ee552ec05708b9
-
Filesize
122KB
MD5216da5c2569c5f30731adb71b9c4cc3a
SHA1afa08f97b8180893d4ec4a99cbfc5128170c7f8e
SHA2566f13dfb9d132d072e941d8f3f7660004dc10aa6cb2680d80dadedb54aab59717
SHA5128c167a07bd74225d5a7c56840b98c2798bb841426936a9f4d9ad4053090f0c05f17755b0da075aa88782f13114cac9eb9801ba58cfde75a7f1ee552ec05708b9
-
Filesize
122KB
MD524b4502d9bf2cd63704b5166bc5e1593
SHA1e07234a84f3af4cc698a4af614213315d267c75e
SHA2568c3bf2381eebbe95dbc9ef04f5facdd9e6d02d4493ff799f846cd6acb1314c86
SHA5122c3c492043445a97e4f2bfbc6bc85e5324d55abbf91fefd92ec2a73ede6a559ec9a8114329884d3545b90ed37c9ab2386d32750e63d444b18ee07747e4c5e3bf
-
Filesize
122KB
MD524b4502d9bf2cd63704b5166bc5e1593
SHA1e07234a84f3af4cc698a4af614213315d267c75e
SHA2568c3bf2381eebbe95dbc9ef04f5facdd9e6d02d4493ff799f846cd6acb1314c86
SHA5122c3c492043445a97e4f2bfbc6bc85e5324d55abbf91fefd92ec2a73ede6a559ec9a8114329884d3545b90ed37c9ab2386d32750e63d444b18ee07747e4c5e3bf
-
Filesize
122KB
MD5f5cce3275dcae289f15785ba7b73c565
SHA16c6f213ff9558b561f3de0259ead4bdf0138df90
SHA256f535ab144a164905fef67b861160c5c80ad2eaa93ea8a94650e3442f0380176f
SHA512af1bf276e8ff450a83b2aa43aaecd644ba7d095492f0015d19f09c0afac882e36696d529cbb0f221f7e0b1483a368d0235ffbd663b135829c8c316eaacda590b
-
Filesize
122KB
MD5f5cce3275dcae289f15785ba7b73c565
SHA16c6f213ff9558b561f3de0259ead4bdf0138df90
SHA256f535ab144a164905fef67b861160c5c80ad2eaa93ea8a94650e3442f0380176f
SHA512af1bf276e8ff450a83b2aa43aaecd644ba7d095492f0015d19f09c0afac882e36696d529cbb0f221f7e0b1483a368d0235ffbd663b135829c8c316eaacda590b
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5755bbb6383b4d00d04449b154b3b8cba
SHA189abd5ee4dcf52e41068ec2f02e65b35a3b9519c
SHA2564df6bc6cd84c202ac49748bc855998a69ef2b84685d13b35b9c3d913159bbfcc
SHA51228280879cba7af19ddb02e974873065cb7d4b621a193c259f0e2759bec9c0b34c79649aa7b747537e8dd022c231f5b748b8d459ee6d5716e21320b1b44f6ff17
-
Filesize
122KB
MD5755bbb6383b4d00d04449b154b3b8cba
SHA189abd5ee4dcf52e41068ec2f02e65b35a3b9519c
SHA2564df6bc6cd84c202ac49748bc855998a69ef2b84685d13b35b9c3d913159bbfcc
SHA51228280879cba7af19ddb02e974873065cb7d4b621a193c259f0e2759bec9c0b34c79649aa7b747537e8dd022c231f5b748b8d459ee6d5716e21320b1b44f6ff17
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD5b66fc8194f9b65900409d5ad56133eb0
SHA10037ee4b9cb577c2b54542d9034cc183116f09dd
SHA2567811c6848c9ca716c3ea02faa299ccaab541c2524e7ffc37fbd2c988948de18b
SHA512cdcdbf2a2e9ab66b1a620a72c2ef149acec5469e606bf734935300b1c4daaecc2497b6dc84b9e3eefb665176fc251df24cb821e8f4372a17bcea8241372151f0
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD531076f3c67507fd66ebbe58cb087f7cd
SHA151404b9773973ad7d266b482829bcb06d9abf2ed
SHA25689168033c3a6a85490f0a6fee4a0f4e9937e3a673b882599439e76c4b7458ccb
SHA5124426ad8ede21ff3700af476359c50791e94ed3c58b48db43481e38c9d54326d2e82a43bd7e1fa66d6ff7cf710f90f4ff24a96867cf4fcac0d3ff4a81073a382e
-
Filesize
122KB
MD531076f3c67507fd66ebbe58cb087f7cd
SHA151404b9773973ad7d266b482829bcb06d9abf2ed
SHA25689168033c3a6a85490f0a6fee4a0f4e9937e3a673b882599439e76c4b7458ccb
SHA5124426ad8ede21ff3700af476359c50791e94ed3c58b48db43481e38c9d54326d2e82a43bd7e1fa66d6ff7cf710f90f4ff24a96867cf4fcac0d3ff4a81073a382e
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD56bc0c1869be0bbc79e42102e435c31bd
SHA10904ae8a938b5def5f01cb8bbc177eef752ad08c
SHA256e6b51d6c2b41e558c28aa082c605417067515d25693d2997364848e1a3f92b10
SHA512c1869b61cc46067610bdf3318477c8449cec2565b338c117819730829df32682cf891d227f4bced622000e41db1495ca66cff8735481f1654aa8f91686cdfc8a
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5e447ad49a652affbd474996d62a138cb
SHA16e5ef21be8a7a1804b2ea2f861bc588c68902674
SHA256ef8ae0983222f6129a7f36a7b1edf936efd151b1d45cea4b859641b67a289681
SHA512b29afa6cf0586370968d3061d4ecf584d7a3e4f822d3cdb94bc58a08057bf26a58d13827bfbf949346dc70af29be9fc31e1cdb87e30ce2f809ec7ce1cda24859
-
Filesize
122KB
MD5727872214157562ece26ed8a0bb8edcc
SHA12a831ee9254ddbf20028a653e6223c210f7f8eff
SHA2562820c4420ea6b73749a03dbaaad61322cb34be66d14190a5d5d66c6c88b0cfc5
SHA512a8fb9efb352b25ca8aa5a14efb5e2b74128d52cf6b93a736bf27e1cdbf39891af147a655a02162313358d07da7ef67c7bcf0f36e7458c832243a05208b83827e
-
Filesize
122KB
MD5727872214157562ece26ed8a0bb8edcc
SHA12a831ee9254ddbf20028a653e6223c210f7f8eff
SHA2562820c4420ea6b73749a03dbaaad61322cb34be66d14190a5d5d66c6c88b0cfc5
SHA512a8fb9efb352b25ca8aa5a14efb5e2b74128d52cf6b93a736bf27e1cdbf39891af147a655a02162313358d07da7ef67c7bcf0f36e7458c832243a05208b83827e
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD5e79f7ec9a149f3d5f3802e9db54d5457
SHA1c9eec9df32dbc0b17e2d554456648cb1a7bd9b71
SHA25695c8d188d89d8e4e64f4738743fd50bc7904549c13a94aac6e902627c0d22d86
SHA512d0fad80b8a7f7022ccea34102c02b4820794533dc7f9ac4d44d015165fd4c9617c15b3c193006ee46d2f5206742bf4ea43d204db424c9eab6f81f47929d20de7
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852
-
Filesize
122KB
MD53c4436a9ba7ac52fa9aa11850960dbdb
SHA121ada12a49c665a61c63a8cdd4a5557ef880db16
SHA2563c7292aa7afea341812277c25607d769a59e0b4d7df989b0983a8b087960cf19
SHA512ff734acdee1c743b7c6cf77677d5805b926e11951c69e2bdd177666f71be4f9c7a41c647ace151adad427611f2f2f703d38463e72ebdbd899ea1c5468316a852