Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
11/11/2023, 15:44
Behavioral task
behavioral1
Sample
NEAS.8080b3e3aab2eafaf171712628d12050.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.8080b3e3aab2eafaf171712628d12050.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.8080b3e3aab2eafaf171712628d12050.exe
-
Size
182KB
-
MD5
8080b3e3aab2eafaf171712628d12050
-
SHA1
b673725d465a584df1ea92795c2b633659d51270
-
SHA256
d9c958900ca34f053b456e226eef4814f176f70f3e2260e616043593e28b2520
-
SHA512
6f675e277198dd57cc526c35f7e9a822326e6aa5c423d225f1c796a1ee717a2aa0b225e852559d3ac9305ad2ec56299e56df73de97c6068ee76a6c96c9f89086
-
SSDEEP
1536:heT7BVwxfvEFwjRs1PDXFi0VvBYv3kZtAV7ZBbP1yVGqV6zSVSGzsNEP:hmVwRKCULFlav+m7ZB5e3V6z1GzCi
Malware Config
Signatures
-
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x001f00000001469b-5.dat family_berbew behavioral1/files/0x001f00000001469b-7.dat family_berbew behavioral1/files/0x001f00000001469b-9.dat family_berbew behavioral1/files/0x001f00000001469b-12.dat family_berbew behavioral1/memory/2540-13-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x0007000000014c3c-17.dat family_berbew behavioral1/memory/2196-23-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/files/0x0007000000014c3c-24.dat family_berbew behavioral1/files/0x0007000000014c3c-19.dat family_berbew behavioral1/files/0x0009000000015047-32.dat family_berbew behavioral1/memory/2180-31-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x0009000000015047-29.dat family_berbew behavioral1/files/0x0009000000015047-36.dat family_berbew behavioral1/files/0x0008000000014f77-40.dat family_berbew behavioral1/files/0x0008000000014f77-42.dat family_berbew behavioral1/files/0x0008000000014f77-46.dat family_berbew behavioral1/files/0x0006000000015618-51.dat family_berbew behavioral1/files/0x0006000000015618-53.dat family_berbew behavioral1/memory/2684-50-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x0006000000015618-57.dat family_berbew behavioral1/memory/2196-58-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/memory/2844-62-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x000900000001531d-63.dat family_berbew behavioral1/files/0x000900000001531d-65.dat family_berbew behavioral1/files/0x000900000001531d-70.dat family_berbew behavioral1/memory/2540-71-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/memory/2196-69-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/memory/2744-75-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x000600000001587a-78.dat family_berbew behavioral1/memory/2196-83-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/files/0x000600000001587a-82.dat family_berbew behavioral1/files/0x000600000001587a-76.dat family_berbew behavioral1/memory/2784-85-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x001f00000001469b-89.dat family_berbew behavioral1/memory/2632-88-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x00210000000146d7-95.dat family_berbew behavioral1/files/0x00210000000146d7-98.dat family_berbew behavioral1/files/0x0006000000015c3e-106.dat family_berbew behavioral1/files/0x0006000000015c3e-102.dat family_berbew behavioral1/files/0x0006000000015c3e-100.dat family_berbew behavioral1/files/0x0006000000015c3e-110.dat family_berbew behavioral1/files/0x0006000000015c60-112.dat family_berbew behavioral1/files/0x0006000000015c60-118.dat family_berbew behavioral1/memory/2892-120-0x00000000003D0000-0x00000000003F9000-memory.dmp family_berbew behavioral1/files/0x0006000000015c60-114.dat family_berbew behavioral1/files/0x0006000000015c73-129.dat family_berbew behavioral1/memory/2196-147-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/memory/2196-137-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/files/0x0006000000015c73-134.dat family_berbew behavioral1/memory/1696-151-0x00000000002A0000-0x00000000002C9000-memory.dmp family_berbew behavioral1/memory/1820-133-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/memory/2892-128-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x0006000000015c73-126.dat family_berbew behavioral1/memory/1664-152-0x0000000000400000-0x0000000000429000-memory.dmp family_berbew behavioral1/files/0x0006000000015c73-153.dat family_berbew behavioral1/files/0x0008000000015c69-157.dat family_berbew behavioral1/files/0x0008000000015c69-162.dat family_berbew behavioral1/memory/2196-163-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/memory/2196-161-0x00000000002B0000-0x00000000002D9000-memory.dmp family_berbew behavioral1/files/0x0008000000015c69-155.dat family_berbew behavioral1/files/0x0008000000015c69-166.dat family_berbew behavioral1/files/0x0006000000015c94-168.dat family_berbew behavioral1/memory/2808-170-0x0000000000320000-0x0000000000349000-memory.dmp family_berbew -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NEAS.8080b3e3aab2eafaf171712628d12050.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2540 backup.exe 2180 backup.exe 2784 backup.exe 2684 backup.exe 2844 backup.exe 2744 backup.exe 2632 backup.exe 1696 backup.exe 2892 backup.exe 1820 backup.exe 1664 backup.exe 2808 backup.exe 1568 backup.exe 2184 backup.exe 2356 update.exe 2932 backup.exe 1608 backup.exe 936 backup.exe 2224 backup.exe 1924 System Restore.exe 2332 backup.exe 2500 backup.exe 2496 backup.exe 872 backup.exe 1412 backup.exe 1588 backup.exe 1612 backup.exe 2000 backup.exe 2444 System Restore.exe 2704 backup.exe 2292 backup.exe 2236 backup.exe 2636 backup.exe 2612 backup.exe 3064 backup.exe 2112 backup.exe 2568 backup.exe 2936 data.exe 676 backup.exe 2812 update.exe 784 backup.exe 112 backup.exe 2808 backup.exe 2620 backup.exe 1476 backup.exe 1128 backup.exe 1812 backup.exe 1220 backup.exe 1176 backup.exe 1452 backup.exe 1284 backup.exe 2060 backup.exe 2052 backup.exe 1740 backup.exe 700 backup.exe 2268 backup.exe 2028 backup.exe 1724 backup.exe 1700 backup.exe 2884 update.exe 2380 backup.exe 2840 backup.exe 2820 backup.exe 2608 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 1696 backup.exe 1696 backup.exe 2892 backup.exe 2892 backup.exe 1696 backup.exe 1696 backup.exe 1664 backup.exe 1664 backup.exe 2808 backup.exe 2808 backup.exe 1664 backup.exe 1664 backup.exe 2184 backup.exe 2356 update.exe 2356 update.exe 2356 update.exe 2356 update.exe 2356 update.exe 2932 backup.exe 2932 backup.exe 2932 backup.exe 2356 update.exe 2356 update.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 1608 backup.exe 936 backup.exe 936 backup.exe 936 backup.exe 1608 backup.exe 1608 backup.exe 2224 backup.exe 2224 backup.exe 2224 backup.exe 1608 backup.exe 1608 backup.exe 1924 System Restore.exe 1924 System Restore.exe 1924 System Restore.exe 1608 backup.exe 1608 backup.exe 2332 backup.exe 2332 backup.exe 2332 backup.exe 1608 backup.exe 1608 backup.exe 2500 backup.exe 2500 backup.exe -
resource yara_rule behavioral1/memory/2196-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x001f00000001469b-5.dat upx behavioral1/files/0x001f00000001469b-7.dat upx behavioral1/files/0x001f00000001469b-9.dat upx behavioral1/files/0x001f00000001469b-12.dat upx behavioral1/memory/2540-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0007000000014c3c-17.dat upx behavioral1/files/0x0007000000014c3c-24.dat upx behavioral1/files/0x0007000000014c3c-19.dat upx behavioral1/files/0x0009000000015047-32.dat upx behavioral1/memory/2180-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0009000000015047-29.dat upx behavioral1/files/0x0009000000015047-36.dat upx behavioral1/files/0x0008000000014f77-40.dat upx behavioral1/files/0x0008000000014f77-42.dat upx behavioral1/files/0x0008000000014f77-46.dat upx behavioral1/files/0x0006000000015618-51.dat upx behavioral1/files/0x0006000000015618-53.dat upx behavioral1/memory/2684-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0006000000015618-57.dat upx behavioral1/memory/2196-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2844-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x000900000001531d-63.dat upx behavioral1/files/0x000900000001531d-65.dat upx behavioral1/files/0x000900000001531d-70.dat upx behavioral1/memory/2540-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x000600000001587a-78.dat upx behavioral1/files/0x000600000001587a-82.dat upx behavioral1/files/0x000600000001587a-76.dat upx behavioral1/memory/2784-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x001f00000001469b-89.dat upx behavioral1/memory/2632-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x00210000000146d7-95.dat upx behavioral1/files/0x00210000000146d7-98.dat upx behavioral1/files/0x0006000000015c3e-106.dat upx behavioral1/files/0x0006000000015c3e-102.dat upx behavioral1/files/0x0006000000015c3e-100.dat upx behavioral1/files/0x0006000000015c3e-110.dat upx behavioral1/files/0x0006000000015c60-112.dat upx behavioral1/files/0x0006000000015c60-118.dat upx behavioral1/files/0x0006000000015c60-114.dat upx behavioral1/files/0x0006000000015c73-129.dat upx behavioral1/files/0x0006000000015c73-134.dat upx behavioral1/memory/1820-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0006000000015c73-126.dat upx behavioral1/memory/1664-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0006000000015c73-153.dat upx behavioral1/files/0x0008000000015c69-157.dat upx behavioral1/files/0x0008000000015c69-162.dat upx behavioral1/files/0x0008000000015c69-155.dat upx behavioral1/files/0x0008000000015c69-166.dat upx behavioral1/files/0x0006000000015c94-168.dat upx behavioral1/files/0x0006000000015c94-171.dat upx behavioral1/files/0x0006000000015c94-175.dat upx behavioral1/memory/2808-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1568-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0007000000015c8a-181.dat upx behavioral1/files/0x0007000000015c8a-183.dat upx behavioral1/memory/1696-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/files/0x0007000000015c8a-187.dat upx behavioral1/files/0x0007000000015c8a-191.dat upx behavioral1/files/0x0006000000015ca9-193.dat upx -
Drops file in Program Files directory 59 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 2540 backup.exe 2180 backup.exe 2784 backup.exe 2684 backup.exe 2844 backup.exe 2744 backup.exe 2632 backup.exe 1696 backup.exe 2892 backup.exe 1820 backup.exe 1664 backup.exe 2808 backup.exe 1568 backup.exe 2184 backup.exe 2356 update.exe 2932 backup.exe 1608 backup.exe 936 backup.exe 2224 backup.exe 1924 System Restore.exe 2332 backup.exe 2500 backup.exe 2496 backup.exe 872 backup.exe 1412 backup.exe 1588 backup.exe 1612 backup.exe 2000 backup.exe 2444 System Restore.exe 2704 backup.exe 2292 backup.exe 2236 backup.exe 2636 backup.exe 2612 backup.exe 3064 backup.exe 2112 backup.exe 2568 backup.exe 2936 data.exe 676 backup.exe 2812 update.exe 784 backup.exe 112 backup.exe 2808 backup.exe 2620 backup.exe 1476 backup.exe 1128 backup.exe 1812 backup.exe 1220 backup.exe 1176 backup.exe 1452 backup.exe 1284 backup.exe 2060 backup.exe 2052 backup.exe 1740 backup.exe 700 backup.exe 2268 backup.exe 2028 backup.exe 1724 backup.exe 1700 backup.exe 2884 update.exe 2380 backup.exe 2840 backup.exe 2820 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 2540 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 27 PID 2196 wrote to memory of 2540 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 27 PID 2196 wrote to memory of 2540 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 27 PID 2196 wrote to memory of 2540 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 27 PID 2196 wrote to memory of 2180 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 28 PID 2196 wrote to memory of 2180 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 28 PID 2196 wrote to memory of 2180 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 28 PID 2196 wrote to memory of 2180 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 28 PID 2196 wrote to memory of 2784 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 29 PID 2196 wrote to memory of 2784 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 29 PID 2196 wrote to memory of 2784 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 29 PID 2196 wrote to memory of 2784 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 29 PID 2196 wrote to memory of 2684 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 30 PID 2196 wrote to memory of 2684 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 30 PID 2196 wrote to memory of 2684 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 30 PID 2196 wrote to memory of 2684 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 30 PID 2196 wrote to memory of 2844 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 31 PID 2196 wrote to memory of 2844 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 31 PID 2196 wrote to memory of 2844 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 31 PID 2196 wrote to memory of 2844 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 31 PID 2196 wrote to memory of 2744 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 32 PID 2196 wrote to memory of 2744 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 32 PID 2196 wrote to memory of 2744 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 32 PID 2196 wrote to memory of 2744 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 32 PID 2196 wrote to memory of 2632 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 33 PID 2196 wrote to memory of 2632 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 33 PID 2196 wrote to memory of 2632 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 33 PID 2196 wrote to memory of 2632 2196 NEAS.8080b3e3aab2eafaf171712628d12050.exe 33 PID 2540 wrote to memory of 1696 2540 backup.exe 34 PID 2540 wrote to memory of 1696 2540 backup.exe 34 PID 2540 wrote to memory of 1696 2540 backup.exe 34 PID 2540 wrote to memory of 1696 2540 backup.exe 34 PID 1696 wrote to memory of 2892 1696 backup.exe 35 PID 1696 wrote to memory of 2892 1696 backup.exe 35 PID 1696 wrote to memory of 2892 1696 backup.exe 35 PID 1696 wrote to memory of 2892 1696 backup.exe 35 PID 2892 wrote to memory of 1820 2892 backup.exe 36 PID 2892 wrote to memory of 1820 2892 backup.exe 36 PID 2892 wrote to memory of 1820 2892 backup.exe 36 PID 2892 wrote to memory of 1820 2892 backup.exe 36 PID 1696 wrote to memory of 1664 1696 backup.exe 37 PID 1696 wrote to memory of 1664 1696 backup.exe 37 PID 1696 wrote to memory of 1664 1696 backup.exe 37 PID 1696 wrote to memory of 1664 1696 backup.exe 37 PID 1664 wrote to memory of 2808 1664 backup.exe 38 PID 1664 wrote to memory of 2808 1664 backup.exe 38 PID 1664 wrote to memory of 2808 1664 backup.exe 38 PID 1664 wrote to memory of 2808 1664 backup.exe 38 PID 2808 wrote to memory of 1568 2808 backup.exe 39 PID 2808 wrote to memory of 1568 2808 backup.exe 39 PID 2808 wrote to memory of 1568 2808 backup.exe 39 PID 2808 wrote to memory of 1568 2808 backup.exe 39 PID 1664 wrote to memory of 2184 1664 backup.exe 40 PID 1664 wrote to memory of 2184 1664 backup.exe 40 PID 1664 wrote to memory of 2184 1664 backup.exe 40 PID 1664 wrote to memory of 2184 1664 backup.exe 40 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2184 wrote to memory of 2356 2184 backup.exe 41 PID 2356 wrote to memory of 2932 2356 update.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.8080b3e3aab2eafaf171712628d12050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" System Restore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8080b3e3aab2eafaf171712628d12050.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8080b3e3aab2eafaf171712628d12050.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3691992981\backup.exeC:\Users\Admin\AppData\Local\Temp\3691992981\backup.exe C:\Users\Admin\AppData\Local\Temp\3691992981\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2540 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2892 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1820
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1568
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2184 -
C:\Program Files\Common Files\Microsoft Shared\update.exe"C:\Program Files\Common Files\Microsoft Shared\update.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2356 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:936
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2224
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2332
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2500
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2496
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1412
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1588
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2704
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2292
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2636
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2612
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2568
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2936
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:676
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:112
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2620
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1476
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1128
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1812
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1220
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1176
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1284
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2060
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2052
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1740
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2028
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1724
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2884
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2380
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2840
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵PID:2916
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵PID:2852
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:2756
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:2456
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:2380
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1216
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:2548
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵PID:768
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:1720
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵PID:2320
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1980
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1108
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵PID:1200
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵PID:2536
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵PID:1092
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵PID:1772
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\8⤵PID:1456
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\8⤵PID:2236
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:840
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:2192
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2416
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵PID:2920
-
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵PID:1080
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵PID:1648
-
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:584
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1616
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1500
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1900
-
-
C:\Program Files\Common Files\System\fr-FR\data.exe"C:\Program Files\Common Files\System\fr-FR\data.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:1180
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:3016
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:1968
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2484
-
-
C:\Program Files\Common Files\System\Ole DB\backup.exe"C:\Program Files\Common Files\System\Ole DB\backup.exe" C:\Program Files\Common Files\System\Ole DB\7⤵PID:2076
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵PID:2700
-
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵PID:1740
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵PID:3052
-
-
C:\Program Files\DVD Maker\es-ES\backup.exe"C:\Program Files\DVD Maker\es-ES\backup.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1908
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:872
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1912
-
-
C:\Program Files\DVD Maker\ja-JP\data.exe"C:\Program Files\DVD Maker\ja-JP\data.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:2852
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵PID:1232
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵PID:528
-
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1712
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵PID:2480
-
C:\Program Files\Internet Explorer\de-DE\backup.exe"C:\Program Files\Internet Explorer\de-DE\backup.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:2196
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:2668
-
-
C:\Program Files\Internet Explorer\es-ES\backup.exe"C:\Program Files\Internet Explorer\es-ES\backup.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:2116
-
-
C:\Program Files\Internet Explorer\fr-FR\backup.exe"C:\Program Files\Internet Explorer\fr-FR\backup.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:1824
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:1012
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:592
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:1904
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:2828
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1564
-
C:\Program Files\Java\jdk1.7.0_80\update.exe"C:\Program Files\Java\jdk1.7.0_80\update.exe" C:\Program Files\Java\jdk1.7.0_80\6⤵PID:2748
-
C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe"C:\Program Files\Java\jdk1.7.0_80\bin\backup.exe" C:\Program Files\Java\jdk1.7.0_80\bin\7⤵PID:2808
-
-
C:\Program Files\Java\jdk1.7.0_80\db\backup.exe"C:\Program Files\Java\jdk1.7.0_80\db\backup.exe" C:\Program Files\Java\jdk1.7.0_80\db\7⤵PID:2044
-
-
C:\Program Files\Java\jdk1.7.0_80\include\backup.exe"C:\Program Files\Java\jdk1.7.0_80\include\backup.exe" C:\Program Files\Java\jdk1.7.0_80\include\7⤵PID:2528
-
-
C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe"C:\Program Files\Java\jdk1.7.0_80\jre\backup.exe" C:\Program Files\Java\jdk1.7.0_80\jre\7⤵PID:1520
-
-
C:\Program Files\Java\jdk1.7.0_80\lib\backup.exe"C:\Program Files\Java\jdk1.7.0_80\lib\backup.exe" C:\Program Files\Java\jdk1.7.0_80\lib\7⤵PID:1516
-
-
-
C:\Program Files\Java\jre7\backup.exe"C:\Program Files\Java\jre7\backup.exe" C:\Program Files\Java\jre7\6⤵PID:2676
-
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:2904
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:2372
-
C:\Program Files\Microsoft Office\Office14\backup.exe"C:\Program Files\Microsoft Office\Office14\backup.exe" C:\Program Files\Microsoft Office\Office14\6⤵PID:2492
-
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:1696
-
-
C:\Program Files\MSBuild\backup.exe"C:\Program Files\MSBuild\backup.exe" C:\Program Files\MSBuild\5⤵PID:2632
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:436
-
-
C:\Program Files\VideoLAN\backup.exe"C:\Program Files\VideoLAN\backup.exe" C:\Program Files\VideoLAN\5⤵PID:1600
-
-
C:\Program Files\Windows Defender\backup.exe"C:\Program Files\Windows Defender\backup.exe" C:\Program Files\Windows Defender\5⤵PID:2032
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- System policy modification
PID:2608 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵PID:2596
-
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵PID:1088
-
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:112
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵PID:1360
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵PID:2996
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵PID:2880
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵PID:2816
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:952
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵PID:2736
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵PID:1752
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵PID:1960
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:2292
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:2936
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵PID:2088
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:2580
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵PID:2180
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵PID:1064
-
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:1012
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:2724
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:1640
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2040
-
C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe"C:\Program Files (x86)\Internet Explorer\de-DE\backup.exe" C:\Program Files (x86)\Internet Explorer\de-DE\6⤵PID:2692
-
-
C:\Program Files (x86)\Internet Explorer\en-US\backup.exe"C:\Program Files (x86)\Internet Explorer\en-US\backup.exe" C:\Program Files (x86)\Internet Explorer\en-US\6⤵PID:784
-
-
C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe"C:\Program Files (x86)\Internet Explorer\es-ES\backup.exe" C:\Program Files (x86)\Internet Explorer\es-ES\6⤵PID:3000
-
-
C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe"C:\Program Files (x86)\Internet Explorer\fr-FR\backup.exe" C:\Program Files (x86)\Internet Explorer\fr-FR\6⤵PID:2704
-
-
C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe"C:\Program Files (x86)\Internet Explorer\it-IT\backup.exe" C:\Program Files (x86)\Internet Explorer\it-IT\6⤵PID:620
-
-
C:\Program Files (x86)\Internet Explorer\ja-JP\update.exe"C:\Program Files (x86)\Internet Explorer\ja-JP\update.exe" C:\Program Files (x86)\Internet Explorer\ja-JP\6⤵PID:880
-
-
C:\Program Files (x86)\Internet Explorer\SIGNUP\backup.exe"C:\Program Files (x86)\Internet Explorer\SIGNUP\backup.exe" C:\Program Files (x86)\Internet Explorer\SIGNUP\6⤵PID:2964
-
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2428
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\6⤵PID:2672
-
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:848
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft.NET\backup.exe"C:\Program Files (x86)\Microsoft.NET\backup.exe" C:\Program Files (x86)\Microsoft.NET\5⤵PID:2652
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\backup.exe"C:\Program Files (x86)\Mozilla Maintenance Service\backup.exe" C:\Program Files (x86)\Mozilla Maintenance Service\5⤵PID:476
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵PID:1392
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵PID:2932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182KB
MD599aec1ab73944c767328f28039698fb8
SHA1538a5ee8da490abf6b201c54dfee3da0c2fcf978
SHA2566ae351c85bdcb3d97c1d92b448c5bb3e05cb401116656d667085585c302a3026
SHA512a453051fe6840443500f1ad3640ec94130f7c02b0147918cfe634130af163b9628d37262e173f9098f4956363f843e419669ce5151b181b7de229da959223a81
-
Filesize
182KB
MD5240222cf05e98f4a7a301639c86ebe37
SHA15e7b31a94f92de1dca4e524e960d8626e1ae74b4
SHA256b82970ca8466a252f8aea031e28f7c76a329faf2e9e67bc396d722171c4059d8
SHA512d0e009d377879ca59f94eedff99ac20e9eb402805776b2760e883c47dae3c958b76c34e79eca50132a49855705b438efc07aa7f91396a79dafc1597f3b73b207
-
Filesize
182KB
MD5240222cf05e98f4a7a301639c86ebe37
SHA15e7b31a94f92de1dca4e524e960d8626e1ae74b4
SHA256b82970ca8466a252f8aea031e28f7c76a329faf2e9e67bc396d722171c4059d8
SHA512d0e009d377879ca59f94eedff99ac20e9eb402805776b2760e883c47dae3c958b76c34e79eca50132a49855705b438efc07aa7f91396a79dafc1597f3b73b207
-
Filesize
182KB
MD5d77edd58487cd08391a35fc5579bdde4
SHA1fe3bdbc7e8b7b8732c82f420d4d93e0b4188e26e
SHA256d1a8b1402ca01bb73c7f25d3d3a71df3c7f3c30e2227cb72505e72edd48ddcd0
SHA512582945701f76e6f012a7caab7929b8f3aac8b486c4d0cf5329a187ca8a2f6fd7f08da5fb88a91d8d45307edc03ab802ee9a7a961f35860177f63a7f44e855e9a
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5b049940b259b77497ae610fbcd613acb
SHA1516e7ca86d565300df1f24ec5a0181a424c8d2c8
SHA256ba6de7bbcf94d95a8429fb82fe86e534cbbf4168c69e1365f7bbb3d86e5ad0cf
SHA51221feebaea28af8f0336d065ac9549a1c56ac38e953f6c5a847fb612bd901f971be3ddfc2c97969ae563fef86ba720d4e428c28537ea3240eec56db101f8d30aa
-
Filesize
182KB
MD5b049940b259b77497ae610fbcd613acb
SHA1516e7ca86d565300df1f24ec5a0181a424c8d2c8
SHA256ba6de7bbcf94d95a8429fb82fe86e534cbbf4168c69e1365f7bbb3d86e5ad0cf
SHA51221feebaea28af8f0336d065ac9549a1c56ac38e953f6c5a847fb612bd901f971be3ddfc2c97969ae563fef86ba720d4e428c28537ea3240eec56db101f8d30aa
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
50KB
MD545faceb9f7a806b8c0b729eb00422c75
SHA19addaf8e33c2ce89f97a7020edfbd6455fe91966
SHA256f2172a8f4a002046147a68be50b582be71811c776bf0acf963f7aeb241946b1b
SHA512bc761ddc1c448756245b330e62e3ddd7ce5faeb27247cfa2dfb29b68cdce5a36815d6842b14ef94b0e4e78290057b8af403a96934fbdeb0efd593157bbe9fd83
-
Filesize
182KB
MD53fa4b0e1a0e8d6b534a86758fd2ce82e
SHA1adc41cb4cea9cfd9c3548e39ee10bd0f35110311
SHA25615a98c0064f73b72bdf8ac9534ee2cb8eaba361387470e8635d8d45158daed91
SHA51200029f21f457c8f779ef856d3c51a47348194fa05be1fca7bdbee0134466b737954e915f62a581ffe6664fa038f8f64be6ae43884a3a2cbefe454817414b7df2
-
Filesize
182KB
MD53fa4b0e1a0e8d6b534a86758fd2ce82e
SHA1adc41cb4cea9cfd9c3548e39ee10bd0f35110311
SHA25615a98c0064f73b72bdf8ac9534ee2cb8eaba361387470e8635d8d45158daed91
SHA51200029f21f457c8f779ef856d3c51a47348194fa05be1fca7bdbee0134466b737954e915f62a581ffe6664fa038f8f64be6ae43884a3a2cbefe454817414b7df2
-
Filesize
182KB
MD599aec1ab73944c767328f28039698fb8
SHA1538a5ee8da490abf6b201c54dfee3da0c2fcf978
SHA2566ae351c85bdcb3d97c1d92b448c5bb3e05cb401116656d667085585c302a3026
SHA512a453051fe6840443500f1ad3640ec94130f7c02b0147918cfe634130af163b9628d37262e173f9098f4956363f843e419669ce5151b181b7de229da959223a81
-
Filesize
182KB
MD599aec1ab73944c767328f28039698fb8
SHA1538a5ee8da490abf6b201c54dfee3da0c2fcf978
SHA2566ae351c85bdcb3d97c1d92b448c5bb3e05cb401116656d667085585c302a3026
SHA512a453051fe6840443500f1ad3640ec94130f7c02b0147918cfe634130af163b9628d37262e173f9098f4956363f843e419669ce5151b181b7de229da959223a81
-
Filesize
182KB
MD5240222cf05e98f4a7a301639c86ebe37
SHA15e7b31a94f92de1dca4e524e960d8626e1ae74b4
SHA256b82970ca8466a252f8aea031e28f7c76a329faf2e9e67bc396d722171c4059d8
SHA512d0e009d377879ca59f94eedff99ac20e9eb402805776b2760e883c47dae3c958b76c34e79eca50132a49855705b438efc07aa7f91396a79dafc1597f3b73b207
-
Filesize
182KB
MD5240222cf05e98f4a7a301639c86ebe37
SHA15e7b31a94f92de1dca4e524e960d8626e1ae74b4
SHA256b82970ca8466a252f8aea031e28f7c76a329faf2e9e67bc396d722171c4059d8
SHA512d0e009d377879ca59f94eedff99ac20e9eb402805776b2760e883c47dae3c958b76c34e79eca50132a49855705b438efc07aa7f91396a79dafc1597f3b73b207
-
Filesize
182KB
MD5d77edd58487cd08391a35fc5579bdde4
SHA1fe3bdbc7e8b7b8732c82f420d4d93e0b4188e26e
SHA256d1a8b1402ca01bb73c7f25d3d3a71df3c7f3c30e2227cb72505e72edd48ddcd0
SHA512582945701f76e6f012a7caab7929b8f3aac8b486c4d0cf5329a187ca8a2f6fd7f08da5fb88a91d8d45307edc03ab802ee9a7a961f35860177f63a7f44e855e9a
-
Filesize
182KB
MD5d77edd58487cd08391a35fc5579bdde4
SHA1fe3bdbc7e8b7b8732c82f420d4d93e0b4188e26e
SHA256d1a8b1402ca01bb73c7f25d3d3a71df3c7f3c30e2227cb72505e72edd48ddcd0
SHA512582945701f76e6f012a7caab7929b8f3aac8b486c4d0cf5329a187ca8a2f6fd7f08da5fb88a91d8d45307edc03ab802ee9a7a961f35860177f63a7f44e855e9a
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD5d91e421ff9d2e7c70749757edce8258d
SHA16ab7a0d7bd8b85b0f7d0f4ce1024d810286ee627
SHA2561a693d892575833c670b08b8d2fd354bb1c91b9011d2368612d4d016af10278f
SHA512fea1fc95fe23c7587cd2e0936f0dfeaaf082369ae86068f0adece2f77d749fee544242fc3c1aca36ae8b95dc90934569bc9108cd8e72c51b389ce3abd3014596
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD56d42de458e509801f6cd44919103df46
SHA10ed30d98612722a25602b3548409fc6b9eaa343e
SHA25634ccff5d5d72098f8633fa039c3aa1165efa70540277a102116af316a8eb670b
SHA5128af15a6f7d327c8178aed74c270edd502f15bbf90f8f96e65defd697a35a0eaea66392746d8d83e8dfae82a1f2c94fe1c79e574289f4a6258bd941e06ddaf528
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5a29859f52a0552d57b893064e0ee6648
SHA19b04f23d917155b62c6c2cf46cae1be42dd854fb
SHA256d97409a9c01876a1253d16f2e4fe1bf3d877569184996f50ec66dd8401717d5d
SHA512fa92f96cd3f30850a9bf69d5a241827775d5f4d3729042bc26b5d4c089e4a1737e19ddaf449596daf46d788a3fe55995f03af9f67639829c8bdb7dd425d7c6b8
-
Filesize
182KB
MD5b049940b259b77497ae610fbcd613acb
SHA1516e7ca86d565300df1f24ec5a0181a424c8d2c8
SHA256ba6de7bbcf94d95a8429fb82fe86e534cbbf4168c69e1365f7bbb3d86e5ad0cf
SHA51221feebaea28af8f0336d065ac9549a1c56ac38e953f6c5a847fb612bd901f971be3ddfc2c97969ae563fef86ba720d4e428c28537ea3240eec56db101f8d30aa
-
Filesize
182KB
MD5b049940b259b77497ae610fbcd613acb
SHA1516e7ca86d565300df1f24ec5a0181a424c8d2c8
SHA256ba6de7bbcf94d95a8429fb82fe86e534cbbf4168c69e1365f7bbb3d86e5ad0cf
SHA51221feebaea28af8f0336d065ac9549a1c56ac38e953f6c5a847fb612bd901f971be3ddfc2c97969ae563fef86ba720d4e428c28537ea3240eec56db101f8d30aa
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5a7b2b22787d5a925ad4a91cf276bf5ff
SHA1cc9bd4794e233aa25d6e31337b58df540fc0d786
SHA256ea04b7140155b11f2ef1a6a1b49890c84039e3bd680b4faa19c791e9811bb857
SHA512226cdb9205807f242949d0739a20e595d666c318dc0c36062f6d618b60d7381f2d7073f9a16242e13edab171ac5e89667f18c3efb438c716e4e7d407edcd89b4
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a
-
Filesize
182KB
MD5ea9235bfa46df1e4414238b40cda99f9
SHA1d816b8e30e4e5121e7dbfb314d0f9989a3b71681
SHA2567ce1d135560a18568b5b432b301684cba6e267634963c45ea5339b89a59e2745
SHA5123690d6a53555b69fe1eabe33a0bfd6535288eb5753c9d7fee138f14810ebd5e9143da043b4a0ac69d8e09e35b54b69e21b9d46744fbd1c63b88f2ff0f78aa77a