Analysis
-
max time kernel
133s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
13-11-2023 01:43
Behavioral task
behavioral1
Sample
NEAS.a781a68f922802e5218813ef298cb8d0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.a781a68f922802e5218813ef298cb8d0.exe
Resource
win10v2004-20231025-en
General
-
Target
NEAS.a781a68f922802e5218813ef298cb8d0.exe
-
Size
122KB
-
MD5
a781a68f922802e5218813ef298cb8d0
-
SHA1
2454eaa639b1d251fc7e05313e38eed00fe353c0
-
SHA256
18465a82902cacae58266b1a40bb9a171832874fa27ce0ee0c7c201ac7132055
-
SHA512
45918ec8b21af92ffbeaef897ae15ebfd11a9ca23ddfd761ad735173cbecc2dbe4a8efdb3dea6618e9c15f2e6f7e9706e5c831dc77537fcfb657249542554074
-
SSDEEP
1536:lvm1Fu8AjYaFwjRUdW7fmyY7aZYJVmy0KQbj6vbjuKoauGi4U:6u8ANCUdgfmD7zey0KUj6TjR9i4U
Malware Config
Signatures
-
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000016ce9-5.dat family_berbew behavioral1/files/0x001b000000016ce9-9.dat family_berbew behavioral1/files/0x001b000000016ce9-7.dat family_berbew behavioral1/memory/2096-13-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000016ce9-12.dat family_berbew behavioral1/files/0x0008000000016d2d-17.dat family_berbew behavioral1/memory/2104-19-0x0000000000260000-0x0000000000284000-memory.dmp family_berbew behavioral1/files/0x0008000000016d2d-21.dat family_berbew behavioral1/files/0x0008000000016d2d-22.dat family_berbew behavioral1/files/0x0008000000016d2d-23.dat family_berbew behavioral1/files/0x0008000000016d2d-24.dat family_berbew behavioral1/files/0x0008000000016d2d-26.dat family_berbew behavioral1/memory/1324-30-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0007000000016d62-33.dat family_berbew behavioral1/files/0x0007000000016d62-31.dat family_berbew behavioral1/memory/2104-39-0x0000000000260000-0x0000000000284000-memory.dmp family_berbew behavioral1/files/0x0007000000016d62-38.dat family_berbew behavioral1/memory/2104-40-0x0000000000260000-0x0000000000284000-memory.dmp family_berbew behavioral1/files/0x0008000000016d50-50.dat family_berbew behavioral1/files/0x0008000000016d50-46.dat family_berbew behavioral1/files/0x0008000000016d50-44.dat family_berbew behavioral1/memory/2324-55-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000016cf7-56.dat family_berbew behavioral1/memory/2104-58-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2096-63-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x001b000000016cf7-59.dat family_berbew behavioral1/files/0x001b000000016cf7-64.dat family_berbew behavioral1/files/0x0009000000016d6d-76.dat family_berbew behavioral1/memory/3056-68-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0009000000016d6d-72.dat family_berbew behavioral1/files/0x0009000000016d6d-70.dat family_berbew behavioral1/files/0x001b000000016ce9-79.dat family_berbew behavioral1/files/0x000500000001866f-85.dat family_berbew behavioral1/files/0x000500000001867b-94.dat family_berbew behavioral1/files/0x000500000001867b-90.dat family_berbew behavioral1/memory/2496-88-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000500000001867b-87.dat family_berbew behavioral1/memory/2252-98-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000500000001866f-101.dat family_berbew behavioral1/files/0x00050000000186ce-103.dat family_berbew behavioral1/files/0x00050000000186ce-105.dat family_berbew behavioral1/files/0x00050000000186ce-109.dat family_berbew behavioral1/memory/3020-110-0x0000000001E10000-0x0000000001E34000-memory.dmp family_berbew behavioral1/files/0x00050000000186ce-113.dat family_berbew behavioral1/files/0x0005000000018717-115.dat family_berbew behavioral1/files/0x0005000000018717-122.dat family_berbew behavioral1/files/0x0005000000018717-118.dat family_berbew behavioral1/memory/2952-123-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2844-125-0x0000000000430000-0x0000000000454000-memory.dmp family_berbew behavioral1/files/0x0006000000018ac3-138.dat family_berbew behavioral1/memory/2844-131-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/932-130-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0006000000018ac3-134.dat family_berbew behavioral1/files/0x0006000000018ac3-132.dat family_berbew behavioral1/memory/3020-151-0x0000000001E10000-0x0000000001E34000-memory.dmp family_berbew behavioral1/files/0x0006000000018ac3-155.dat family_berbew behavioral1/files/0x000700000001871c-157.dat family_berbew behavioral1/memory/740-159-0x00000000002C0000-0x00000000002E4000-memory.dmp family_berbew behavioral1/files/0x000700000001871c-164.dat family_berbew behavioral1/files/0x000700000001871c-160.dat family_berbew behavioral1/memory/2096-165-0x0000000000270000-0x0000000000294000-memory.dmp family_berbew behavioral1/files/0x000700000001871c-168.dat family_berbew behavioral1/files/0x0006000000018b63-170.dat family_berbew -
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 2096 backup.exe 1324 update.exe 2952 backup.exe 2324 backup.exe 3056 backup.exe 2496 backup.exe 3020 backup.exe 2252 backup.exe 2844 backup.exe 932 backup.exe 740 backup.exe 1076 backup.exe 1960 backup.exe 1448 update.exe 2348 backup.exe 1280 backup.exe 1000 backup.exe 2132 backup.exe 1584 backup.exe 2976 backup.exe 2208 backup.exe 1968 backup.exe 1284 backup.exe 1668 backup.exe 2136 backup.exe 2784 backup.exe 2704 backup.exe 2176 backup.exe 2548 data.exe 2532 data.exe 2496 backup.exe 656 backup.exe 1148 backup.exe 2884 backup.exe 1952 backup.exe 2472 backup.exe 1732 backup.exe 2808 backup.exe 1504 backup.exe 2904 backup.exe 2596 backup.exe 2024 System Restore.exe 880 backup.exe 1920 backup.exe 1780 backup.exe 1372 backup.exe 1624 backup.exe 2160 backup.exe 2464 backup.exe 2236 backup.exe 2204 backup.exe 1932 backup.exe 1800 backup.exe 2296 backup.exe 1808 backup.exe 2732 backup.exe 1324 backup.exe 2700 backup.exe 2536 backup.exe 2696 update.exe 2780 backup.exe 2240 backup.exe 2404 backup.exe 2820 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 1324 update.exe 1324 update.exe 1324 update.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 3020 backup.exe 3020 backup.exe 2844 backup.exe 2844 backup.exe 3020 backup.exe 3020 backup.exe 740 backup.exe 740 backup.exe 1076 backup.exe 1076 backup.exe 740 backup.exe 1448 update.exe 1448 update.exe 1448 update.exe 1448 update.exe 1448 update.exe 2348 backup.exe 2348 backup.exe 2348 backup.exe 2348 backup.exe 2348 backup.exe 1280 backup.exe 1280 backup.exe 1280 backup.exe 2348 backup.exe 2348 backup.exe 1000 backup.exe 1000 backup.exe 1000 backup.exe 1000 backup.exe 1000 backup.exe 2132 backup.exe 2132 backup.exe 2132 backup.exe 1000 backup.exe 1000 backup.exe 1584 backup.exe 1584 backup.exe 1584 backup.exe 1000 backup.exe 1000 backup.exe 2976 backup.exe 2976 backup.exe 2976 backup.exe 1000 backup.exe 1000 backup.exe 2208 backup.exe 2208 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\images\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Reference Assemblies\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\update.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\update.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Google\CrashReports\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe backup.exe File opened for modification C:\Program Files\Google\Chrome\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\de-DE\update.exe update.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe data.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Internet Explorer\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe update.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\backup.exe backup.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\update.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 2096 backup.exe 1324 update.exe 2952 backup.exe 2324 backup.exe 3056 backup.exe 2496 backup.exe 2252 backup.exe 3020 backup.exe 2844 backup.exe 932 backup.exe 740 backup.exe 1076 backup.exe 1960 backup.exe 1448 update.exe 2348 backup.exe 1280 backup.exe 1000 backup.exe 2132 backup.exe 1584 backup.exe 2976 backup.exe 2208 backup.exe 1968 backup.exe 1284 backup.exe 1668 backup.exe 2136 backup.exe 2784 backup.exe 2704 backup.exe 2176 backup.exe 2548 data.exe 2532 data.exe 2496 backup.exe 656 backup.exe 1148 backup.exe 2884 backup.exe 1952 backup.exe 2472 backup.exe 1732 backup.exe 2808 backup.exe 1504 backup.exe 2904 backup.exe 2596 backup.exe 2024 System Restore.exe 880 backup.exe 1920 backup.exe 1780 backup.exe 1372 backup.exe 1624 backup.exe 2160 backup.exe 2464 backup.exe 2236 backup.exe 2204 backup.exe 1932 backup.exe 1800 backup.exe 2296 backup.exe 1808 backup.exe 2732 backup.exe 1324 backup.exe 2700 backup.exe 2536 backup.exe 2696 update.exe 2780 backup.exe 2240 backup.exe 2404 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2096 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 28 PID 2104 wrote to memory of 2096 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 28 PID 2104 wrote to memory of 2096 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 28 PID 2104 wrote to memory of 2096 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 28 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 1324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 29 PID 2104 wrote to memory of 2952 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 30 PID 2104 wrote to memory of 2952 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 30 PID 2104 wrote to memory of 2952 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 30 PID 2104 wrote to memory of 2952 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 30 PID 2104 wrote to memory of 2324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 31 PID 2104 wrote to memory of 2324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 31 PID 2104 wrote to memory of 2324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 31 PID 2104 wrote to memory of 2324 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 31 PID 2104 wrote to memory of 3056 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 32 PID 2104 wrote to memory of 3056 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 32 PID 2104 wrote to memory of 3056 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 32 PID 2104 wrote to memory of 3056 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 32 PID 2104 wrote to memory of 2496 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 33 PID 2104 wrote to memory of 2496 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 33 PID 2104 wrote to memory of 2496 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 33 PID 2104 wrote to memory of 2496 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 33 PID 2096 wrote to memory of 3020 2096 backup.exe 34 PID 2096 wrote to memory of 3020 2096 backup.exe 34 PID 2096 wrote to memory of 3020 2096 backup.exe 34 PID 2096 wrote to memory of 3020 2096 backup.exe 34 PID 2104 wrote to memory of 2252 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 35 PID 2104 wrote to memory of 2252 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 35 PID 2104 wrote to memory of 2252 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 35 PID 2104 wrote to memory of 2252 2104 NEAS.a781a68f922802e5218813ef298cb8d0.exe 35 PID 3020 wrote to memory of 2844 3020 backup.exe 36 PID 3020 wrote to memory of 2844 3020 backup.exe 36 PID 3020 wrote to memory of 2844 3020 backup.exe 36 PID 3020 wrote to memory of 2844 3020 backup.exe 36 PID 2844 wrote to memory of 932 2844 backup.exe 37 PID 2844 wrote to memory of 932 2844 backup.exe 37 PID 2844 wrote to memory of 932 2844 backup.exe 37 PID 2844 wrote to memory of 932 2844 backup.exe 37 PID 3020 wrote to memory of 740 3020 backup.exe 38 PID 3020 wrote to memory of 740 3020 backup.exe 38 PID 3020 wrote to memory of 740 3020 backup.exe 38 PID 3020 wrote to memory of 740 3020 backup.exe 38 PID 740 wrote to memory of 1076 740 backup.exe 39 PID 740 wrote to memory of 1076 740 backup.exe 39 PID 740 wrote to memory of 1076 740 backup.exe 39 PID 740 wrote to memory of 1076 740 backup.exe 39 PID 1076 wrote to memory of 1960 1076 backup.exe 40 PID 1076 wrote to memory of 1960 1076 backup.exe 40 PID 1076 wrote to memory of 1960 1076 backup.exe 40 PID 1076 wrote to memory of 1960 1076 backup.exe 40 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 740 wrote to memory of 1448 740 backup.exe 41 PID 1448 wrote to memory of 2348 1448 update.exe 42 PID 1448 wrote to memory of 2348 1448 update.exe 42 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" NEAS.a781a68f922802e5218813ef298cb8d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.a781a68f922802e5218813ef298cb8d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.a781a68f922802e5218813ef298cb8d0.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3532499206\backup.exeC:\Users\Admin\AppData\Local\Temp\3532499206\backup.exe C:\Users\Admin\AppData\Local\Temp\3532499206\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3020 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2844 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
C:\Program Files\Common Files\update.exe"C:\Program Files\Common Files\update.exe" C:\Program Files\Common Files\5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1280
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2132
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1584
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2976
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2208
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1284
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2704
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:656
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2472
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1732
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1504
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2596
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:880
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lt-LT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1372
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\lv-LV\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nb-NO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\nl-NL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pl-PL\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-BR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2204
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\pt-PT\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ro-RO\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ru-RU\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2296
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sk-SK\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sl-SI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sr-Latn-CS\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\sv-SE\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2700
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\th-TH\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2536
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\update.exe"C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\update.exe" C:\Program Files\Common Files\Microsoft Shared\ink\tr-TR\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\uk-UA\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-CN\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\zh-TW\8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2404
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2820 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- System policy modification
PID:2856
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵PID:1248
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵PID:1716
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1880
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:300
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\data.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\data.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵
- Modifies visibility of file extensions in Explorer
PID:1720
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
PID:1600 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:2828
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- System policy modification
PID:2692
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵PID:1316
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵
- Drops file in Program Files directory
PID:1244 -
C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
PID:880
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\en-US\8⤵
- Modifies visibility of file extensions in Explorer
PID:1856
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\update.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\update.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1380
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
PID:1372
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\it-IT\8⤵PID:3052
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\ja-JP\8⤵
- System policy modification
PID:1140
-
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵
- Drops file in Program Files directory
- System policy modification
PID:676 -
C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\data.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\data.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\de-DE\8⤵PID:2208
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\en-US\8⤵
- System policy modification
PID:2592
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\es-ES\8⤵
- System policy modification
PID:2600
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\fr-FR\8⤵
- System policy modification
PID:2508
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\it-IT\8⤵PID:2228
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\ja-JP\8⤵PID:1596
-
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2832
-
-
C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VGX\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VGX\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\7⤵PID:1588
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\8⤵PID:2184
-
C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\1033\9⤵
- Modifies visibility of file extensions in Explorer
PID:344
-
-
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵PID:2500
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:932 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2608
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:864 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:2956
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1672
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:2644
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:2532
-
-
C:\Program Files\Common Files\System\fr-FR\backup.exe"C:\Program Files\Common Files\System\fr-FR\backup.exe" C:\Program Files\Common Files\System\fr-FR\7⤵PID:600
-
-
C:\Program Files\Common Files\System\it-IT\backup.exe"C:\Program Files\Common Files\System\it-IT\backup.exe" C:\Program Files\Common Files\System\it-IT\7⤵PID:2688
-
-
C:\Program Files\Common Files\System\ja-JP\backup.exe"C:\Program Files\Common Files\System\ja-JP\backup.exe" C:\Program Files\Common Files\System\ja-JP\7⤵PID:2384
-
-
C:\Program Files\Common Files\System\msadc\backup.exe"C:\Program Files\Common Files\System\msadc\backup.exe" C:\Program Files\Common Files\System\msadc\7⤵PID:2320
-
-
-
-
C:\Program Files\DVD Maker\update.exe"C:\Program Files\DVD Maker\update.exe" C:\Program Files\DVD Maker\5⤵
- Drops file in Program Files directory
PID:2632 -
C:\Program Files\DVD Maker\de-DE\update.exe"C:\Program Files\DVD Maker\de-DE\update.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Modifies visibility of file extensions in Explorer
PID:1748
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1980
-
-
C:\Program Files\DVD Maker\es-ES\update.exe"C:\Program Files\DVD Maker\es-ES\update.exe" C:\Program Files\DVD Maker\es-ES\6⤵
- Modifies visibility of file extensions in Explorer
PID:1480
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1672
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1680
-
-
C:\Program Files\DVD Maker\ja-JP\backup.exe"C:\Program Files\DVD Maker\ja-JP\backup.exe" C:\Program Files\DVD Maker\ja-JP\6⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2224
-
-
C:\Program Files\DVD Maker\Shared\backup.exe"C:\Program Files\DVD Maker\Shared\backup.exe" C:\Program Files\DVD Maker\Shared\6⤵
- Drops file in Program Files directory
PID:2484 -
C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2156 -
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\data.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\data.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyBoy\8⤵
- Modifies visibility of file extensions in Explorer
PID:1960
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\BabyGirl\8⤵PID:1632
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\data.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\data.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\8⤵PID:2628
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Full\data.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Full\data.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Full\8⤵PID:1040
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\8⤵PID:2180
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\LayeredTitles\8⤵PID:1628
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\8⤵PID:2720
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\8⤵PID:1300
-
-
C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\backup.exe"C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\backup.exe" C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\8⤵PID:1492
-
-
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2684 -
C:\Program Files\Google\Chrome\backup.exe"C:\Program Files\Google\Chrome\backup.exe" C:\Program Files\Google\Chrome\6⤵PID:1740
-
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1236 -
C:\Program Files\Internet Explorer\de-DE\data.exe"C:\Program Files\Internet Explorer\de-DE\data.exe" C:\Program Files\Internet Explorer\de-DE\6⤵PID:2828
-
-
C:\Program Files\Internet Explorer\en-US\backup.exe"C:\Program Files\Internet Explorer\en-US\backup.exe" C:\Program Files\Internet Explorer\en-US\6⤵PID:688
-
-
C:\Program Files\Internet Explorer\es-ES\System Restore.exe"C:\Program Files\Internet Explorer\es-ES\System Restore.exe" C:\Program Files\Internet Explorer\es-ES\6⤵PID:2640
-
-
C:\Program Files\Internet Explorer\fr-FR\data.exe"C:\Program Files\Internet Explorer\fr-FR\data.exe" C:\Program Files\Internet Explorer\fr-FR\6⤵PID:2072
-
-
C:\Program Files\Internet Explorer\images\backup.exe"C:\Program Files\Internet Explorer\images\backup.exe" C:\Program Files\Internet Explorer\images\6⤵PID:1640
-
-
C:\Program Files\Internet Explorer\it-IT\backup.exe"C:\Program Files\Internet Explorer\it-IT\backup.exe" C:\Program Files\Internet Explorer\it-IT\6⤵PID:2120
-
-
C:\Program Files\Internet Explorer\ja-JP\backup.exe"C:\Program Files\Internet Explorer\ja-JP\backup.exe" C:\Program Files\Internet Explorer\ja-JP\6⤵PID:2776
-
-
C:\Program Files\Internet Explorer\SIGNUP\backup.exe"C:\Program Files\Internet Explorer\SIGNUP\backup.exe" C:\Program Files\Internet Explorer\SIGNUP\6⤵PID:2408
-
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:2244
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:2040
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:2792
-
-
C:\Program Files\Mozilla Firefox\backup.exe"C:\Program Files\Mozilla Firefox\backup.exe" C:\Program Files\Mozilla Firefox\5⤵PID:2756
-
-
C:\Program Files\MSBuild\System Restore.exe"C:\Program Files\MSBuild\System Restore.exe" C:\Program Files\MSBuild\5⤵PID:2728
-
-
C:\Program Files\Reference Assemblies\backup.exe"C:\Program Files\Reference Assemblies\backup.exe" C:\Program Files\Reference Assemblies\5⤵PID:2212
-
-
C:\Program Files\VideoLAN\backup.exe"C:\Program Files\VideoLAN\backup.exe" C:\Program Files\VideoLAN\5⤵PID:3028
-
-
C:\Program Files\Windows Defender\backup.exe"C:\Program Files\Windows Defender\backup.exe" C:\Program Files\Windows Defender\5⤵PID:2608
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2256 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵PID:2076
-
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Drops file in Program Files directory
PID:1808 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵
- System policy modification
PID:2612
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\7⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AIR\8⤵
- Modifies visibility of file extensions in Explorer
PID:2488
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AMT\8⤵
- System policy modification
PID:2560
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\update.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\update.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Browser\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2104
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\8⤵PID:2444
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\ENU\9⤵
- System policy modification
PID:964
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:1628
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2216 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\9⤵
- System policy modification
PID:2032
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Optional\8⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:2880
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\8⤵PID:1248
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\8⤵PID:2024
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\SPPlugins\8⤵PID:1552
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\8⤵PID:2480
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\7⤵
- Drops file in Program Files directory
- System policy modification
PID:2700 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\8⤵
- Drops file in Program Files directory
PID:1768 -
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\PFM\9⤵PID:2976
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\data.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\data.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\8⤵PID:2932
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\8⤵PID:3060
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\SaslPrep\8⤵PID:2820
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\8⤵PID:2584
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\7⤵PID:560
-
-
-
-
C:\Program Files (x86)\Common Files\backup.exe"C:\Program Files (x86)\Common Files\backup.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
- System policy modification
PID:2748 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:2824 -
C:\Program Files (x86)\Common Files\Adobe\Acrobat\update.exe"C:\Program Files (x86)\Common Files\Adobe\Acrobat\update.exe" C:\Program Files (x86)\Common Files\Adobe\Acrobat\7⤵PID:2840
-
-
C:\Program Files (x86)\Common Files\Adobe\Help\System Restore.exe"C:\Program Files (x86)\Common Files\Adobe\Help\System Restore.exe" C:\Program Files (x86)\Common Files\Adobe\Help\7⤵PID:2800
-
-
C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe"C:\Program Files (x86)\Common Files\Adobe\Updater6\backup.exe" C:\Program Files (x86)\Common Files\Adobe\Updater6\7⤵PID:1036
-
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:2972
-
-
C:\Program Files (x86)\Common Files\DESIGNER\backup.exe"C:\Program Files (x86)\Common Files\DESIGNER\backup.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:3000
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1864
-
C:\Program Files (x86)\Common Files\microsoft shared\DAO\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\DAO\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\DAO\7⤵PID:1964
-
-
-
C:\Program Files (x86)\Common Files\Services\backup.exe"C:\Program Files (x86)\Common Files\Services\backup.exe" C:\Program Files (x86)\Common Files\Services\6⤵PID:2696
-
-
C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe"C:\Program Files (x86)\Common Files\SpeechEngines\backup.exe" C:\Program Files (x86)\Common Files\SpeechEngines\6⤵PID:1784
-
-
C:\Program Files (x86)\Common Files\System\backup.exe"C:\Program Files (x86)\Common Files\System\backup.exe" C:\Program Files (x86)\Common Files\System\6⤵PID:2636
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Modifies visibility of file extensions in Explorer
- Drops file in Program Files directory
PID:1620 -
C:\Program Files (x86)\Google\CrashReports\backup.exe"C:\Program Files (x86)\Google\CrashReports\backup.exe" C:\Program Files (x86)\Google\CrashReports\6⤵PID:2544
-
-
C:\Program Files (x86)\Google\Temp\backup.exe"C:\Program Files (x86)\Google\Temp\backup.exe" C:\Program Files (x86)\Google\Temp\6⤵PID:2676
-
-
C:\Program Files (x86)\Google\Update\backup.exe"C:\Program Files (x86)\Google\Update\backup.exe" C:\Program Files (x86)\Google\Update\6⤵PID:2136
-
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft Analysis Services\System Restore.exe"C:\Program Files (x86)\Microsoft Analysis Services\System Restore.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft Office\update.exe"C:\Program Files (x86)\Microsoft Office\update.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe"C:\Program Files (x86)\Microsoft SQL Server Compact Edition\backup.exe" C:\Program Files (x86)\Microsoft SQL Server Compact Edition\5⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft Sync Framework\backup.exe"C:\Program Files (x86)\Microsoft Sync Framework\backup.exe" C:\Program Files (x86)\Microsoft Sync Framework\5⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe"C:\Program Files (x86)\Microsoft Synchronization Services\backup.exe" C:\Program Files (x86)\Microsoft Synchronization Services\5⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe"C:\Program Files (x86)\Microsoft Visual Studio 8\backup.exe" C:\Program Files (x86)\Microsoft Visual Studio 8\5⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft.NET\backup.exe"C:\Program Files (x86)\Microsoft.NET\backup.exe" C:\Program Files (x86)\Microsoft.NET\5⤵PID:868
-
-
C:\Program Files (x86)\Mozilla Maintenance Service\backup.exe"C:\Program Files (x86)\Mozilla Maintenance Service\backup.exe" C:\Program Files (x86)\Mozilla Maintenance Service\5⤵PID:2080
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- System policy modification
PID:2736 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵PID:1028
-
C:\Users\Admin\Contacts\backup.exeC:\Users\Admin\Contacts\backup.exe C:\Users\Admin\Contacts\6⤵
- Modifies visibility of file extensions in Explorer
PID:2676
-
-
C:\Users\Admin\Desktop\System Restore.exe"C:\Users\Admin\Desktop\System Restore.exe" C:\Users\Admin\Desktop\6⤵PID:2160
-
-
C:\Users\Admin\Documents\backup.exeC:\Users\Admin\Documents\backup.exe C:\Users\Admin\Documents\6⤵PID:2536
-
-
C:\Users\Admin\Downloads\backup.exeC:\Users\Admin\Downloads\backup.exe C:\Users\Admin\Downloads\6⤵PID:340
-
-
C:\Users\Admin\Favorites\backup.exeC:\Users\Admin\Favorites\backup.exe C:\Users\Admin\Favorites\6⤵PID:1480
-
-
C:\Users\Admin\Links\backup.exeC:\Users\Admin\Links\backup.exe C:\Users\Admin\Links\6⤵PID:1756
-
-
C:\Users\Admin\Music\backup.exeC:\Users\Admin\Music\backup.exe C:\Users\Admin\Music\6⤵PID:1116
-
-
C:\Users\Admin\Pictures\backup.exeC:\Users\Admin\Pictures\backup.exe C:\Users\Admin\Pictures\6⤵PID:2228
-
-
C:\Users\Admin\Saved Games\data.exe"C:\Users\Admin\Saved Games\data.exe" C:\Users\Admin\Saved Games\6⤵PID:1476
-
-
-
C:\Users\Public\backup.exeC:\Users\Public\backup.exe C:\Users\Public\5⤵PID:2400
-
C:\Users\Public\Documents\backup.exeC:\Users\Public\Documents\backup.exe C:\Users\Public\Documents\6⤵PID:268
-
-
C:\Users\Public\Downloads\backup.exeC:\Users\Public\Downloads\backup.exe C:\Users\Public\Downloads\6⤵PID:2864
-
-
-
-
C:\Windows\update.exeC:\Windows\update.exe C:\Windows\4⤵PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\update.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\update.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\backup.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122KB
MD5572e199fc2a151045a1e1afe3322dd86
SHA1dacc5e8443b848c41bde968b4ea864c507ddbf61
SHA2568115df13d23d1dfeb297ad54fd2d1d5894dd55bc841487a6b915cd60e733a3cf
SHA512b788ded20ae8e112eb05f2f7151860c44cbe3cc671f806312a98ab83f08454ebe077b3be416d231502410da4309c9eefb04ce3f9ae121ca01d9af2d28d9339d6
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
40KB
MD5e0ecdc00021ed8de7aef90db38febe3a
SHA19b47f1801b26c44e1c0d6d1cff21cfe379eb5ba9
SHA256a19c4012f294810a494fe0b946741c8f901f8eb679e61ea68f49273db3df67bf
SHA512aea4889b35d195c3efd34b09194ce0c4a13f995ac0725eb62b637756635e09c5ba22f9d3da6079376deffece9456a34c4d812a318d0358d802ee6902595027d9
-
Filesize
22B
MD576cdb2bad9582d23c1f6f4d868218d6c
SHA1b04f3ee8f5e43fa3b162981b50bb72fe1acabb33
SHA2568739c76e681f900923b900c9df0ef75cf421d39cabb54650c4b9ad19b6a76d85
SHA5125e2f959f36b66df0580a94f384c5fc1ceeec4b2a3925f062d7b68f21758b86581ac2adcfdde73a171a28496e758ef1b23ca4951c05455cdae9357cc3b5a5825f
-
Filesize
122KB
MD5fbd1c8ec77e0635faa22ec8d881c6453
SHA1c5d8fdf45cc16166b885e2d1cee220a460f90640
SHA2567914f459a1d1dbcbfdf0b863b26a51ea1df4cb729476c319f1cdfd8e2fc9676b
SHA512d2ff432ab06cda6d3fb9d132b7a9b733002de66aec4048e918f57fe4a9e257c98dc06b5b1c28629c0f1254b1b0e15ac3d3b843429b9b485a402b5f9442c70a20
-
Filesize
122KB
MD5fbd1c8ec77e0635faa22ec8d881c6453
SHA1c5d8fdf45cc16166b885e2d1cee220a460f90640
SHA2567914f459a1d1dbcbfdf0b863b26a51ea1df4cb729476c319f1cdfd8e2fc9676b
SHA512d2ff432ab06cda6d3fb9d132b7a9b733002de66aec4048e918f57fe4a9e257c98dc06b5b1c28629c0f1254b1b0e15ac3d3b843429b9b485a402b5f9442c70a20
-
Filesize
122KB
MD5572e199fc2a151045a1e1afe3322dd86
SHA1dacc5e8443b848c41bde968b4ea864c507ddbf61
SHA2568115df13d23d1dfeb297ad54fd2d1d5894dd55bc841487a6b915cd60e733a3cf
SHA512b788ded20ae8e112eb05f2f7151860c44cbe3cc671f806312a98ab83f08454ebe077b3be416d231502410da4309c9eefb04ce3f9ae121ca01d9af2d28d9339d6
-
Filesize
122KB
MD5572e199fc2a151045a1e1afe3322dd86
SHA1dacc5e8443b848c41bde968b4ea864c507ddbf61
SHA2568115df13d23d1dfeb297ad54fd2d1d5894dd55bc841487a6b915cd60e733a3cf
SHA512b788ded20ae8e112eb05f2f7151860c44cbe3cc671f806312a98ab83f08454ebe077b3be416d231502410da4309c9eefb04ce3f9ae121ca01d9af2d28d9339d6
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5a15b33645293e551fda810f31350d5ab
SHA1c48df77a5385a44a07d67c4f0aefa37475fa55cb
SHA2567c8a33e44df1b126338c102731dfe2a27482a2c88dd4b57ca217965100776f33
SHA512a61cd8b4780d327a69de78b04498800a720dfe751e08c3ba7f930496e29a3dc23aec54a2ce20f3f20cd26065291e87ea226b5233c002899b6ec06da33d83de98
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD5af162487ddf03f52b693cd94bacc5be9
SHA15d6e1574b3864bff1a11ccdee51754483660527d
SHA256f93758ecd13a894402f6f787a30df4eea3428996233ca1e34905fa740e15b1b2
SHA5120bc8716f1f9463a63d855469eb00502254db5ae7e0bf0ccd593ce6637932dfa8ae08e0a1a81a786b9308b4f39c810fa4516c4e815922a1d7ad5a361878c1c68d
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD502e2cc9dd03b9e02156766269d11f84f
SHA1f51a96fb527d53eac4fb7048307d4f150d4a5a23
SHA2561e53ced2cf46c55ef7d86d0434ca903e6f067ccffbec8668df6014f185b8fbe4
SHA5129d476ec0bb2a414482f2eaffdd3cf72137cbb186119e8626b356dfd49deb9154be25fdab2991b7e696e0397d70a2985732cfb6b5a7e5b82a8db3955aeda484fd
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD57925e615e6212bc45c4887efc1d12a7d
SHA13c4c64d2b04abaad3b10190a2903b2a861b4fb7e
SHA256c9d6e33b00ee6940c9b21d4769a16cc76998e0907c1c073e36a733c346902e89
SHA5120d0b862594fb02d839d793fdce0bcf908e8326afc66b9a8f74947c438242e52f70ed976e359f7caf52668493eeb0cc7becb7d263906014fd4e210fe809c84789
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD50c06c0e55186bd6f588f068c4c9dad62
SHA18c87a5941647150600f05770a61e60bfd06b23eb
SHA256487af3393a86e9b4b76f1eafd3b9c82585a7cc23c1defa51bc08f2ed6ae14e76
SHA512a254ce1c548197214bb15c814635f28e85d5b1c423c673755548596446d7088ab77e6b7b4c5980691c651ccea98a54283762669e44699bc01af1e9eb5e672fe8
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5
-
Filesize
122KB
MD5c46de006a4cd578a36d94d24c89e06b7
SHA108bd2a3d5649ed25fb74abda330adf8b397401bf
SHA256b73c56e9a87d0d1d9f8638a19097fea36077b6ba2e241ea79d117900d07ed16c
SHA5121f00aaf7941562d345aa3da3f19626bad9d4492b7b48ff37499a09cf983f10d9f429d15e255a330812bf43c2063f078670c39088f67e8f3ad77cdec55a168df5