Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe
Resource
win10v2004-20220812-en
General
-
Target
68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe
-
Size
72KB
-
MD5
01d6b38dc1b0db873a43778a0f73eb54
-
SHA1
068e084e3a4e1e4bb3d1705dae94bc8a3a3fe2cf
-
SHA256
68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb
-
SHA512
4b910e7781322dba226589b4da301f89203730364dde1dd1c74e7aea2fa5ba92f1f5905e5bebb8dbf97c304143abae24610cb77c3197d6c3c43c33e361cc3e9e
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf27:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 57 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" update.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" System Restore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 64 IoCs
pid Process 1684 backup.exe 1572 backup.exe 1512 backup.exe 908 backup.exe 576 backup.exe 1816 update.exe 1000 backup.exe 856 backup.exe 1504 backup.exe 1160 backup.exe 820 backup.exe 1384 backup.exe 960 backup.exe 1496 backup.exe 1292 backup.exe 1824 backup.exe 1620 System Restore.exe 1572 backup.exe 268 backup.exe 908 backup.exe 1924 backup.exe 968 backup.exe 1932 backup.exe 1816 backup.exe 1268 backup.exe 980 backup.exe 1564 backup.exe 1212 backup.exe 112 backup.exe 1668 backup.exe 1632 backup.exe 1520 backup.exe 2000 backup.exe 1808 backup.exe 1384 backup.exe 532 backup.exe 1648 backup.exe 2036 backup.exe 960 backup.exe 1692 backup.exe 1824 backup.exe 1672 backup.exe 824 backup.exe 1652 backup.exe 900 backup.exe 1572 backup.exe 1784 backup.exe 968 backup.exe 920 backup.exe 1816 backup.exe 1356 data.exe 1564 backup.exe 1700 backup.exe 1088 backup.exe 1160 backup.exe 1952 data.exe 668 backup.exe 1632 backup.exe 1408 backup.exe 2000 backup.exe 1712 backup.exe 568 backup.exe 2044 backup.exe 572 backup.exe -
Loads dropped DLL 64 IoCs
pid Process 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 1816 update.exe 1816 update.exe 1816 update.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 856 backup.exe 856 backup.exe 1504 backup.exe 1504 backup.exe 856 backup.exe 856 backup.exe 820 backup.exe 820 backup.exe 1384 backup.exe 1384 backup.exe 820 backup.exe 820 backup.exe 1496 backup.exe 1496 backup.exe 1292 backup.exe 1292 backup.exe 1292 backup.exe 1292 backup.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 1620 System Restore.exe 112 backup.exe 112 backup.exe 112 backup.exe 112 backup.exe 112 backup.exe 112 backup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\ado\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\System\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe System Restore.exe File opened for modification C:\Program Files\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Adobe\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe backup.exe File opened for modification C:\Program Files\Google\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\System Restore.exe data.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe backup.exe File opened for modification C:\Program Files\Common Files\Services\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe backup.exe File opened for modification C:\Program Files\DVD Maker\fr-FR\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe System Restore.exe File opened for modification C:\Program Files (x86)\Google\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\it-IT\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Analysis Services\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe backup.exe File opened for modification C:\Program Files (x86)\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe System Restore.exe File opened for modification C:\Program Files\DVD Maker\en-US\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe backup.exe File opened for modification C:\Program Files\Java\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\backup.exe data.exe File opened for modification C:\Program Files\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files (x86)\Microsoft Office\backup.exe backup.exe File opened for modification C:\Program Files\7-Zip\Lang\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe backup.exe File opened for modification C:\Program Files\DVD Maker\es-ES\data.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe backup.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\update.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\backup.exe backup.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe System Restore.exe File opened for modification C:\Program Files\Common Files\SpeechEngines\Microsoft\TTS20\backup.exe backup.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\backup.exe backup.exe File opened for modification C:\Windows\addins\backup.exe backup.exe File opened for modification C:\Windows\AppCompat\update.exe backup.exe File opened for modification C:\Windows\AppPatch\backup.exe backup.exe File opened for modification C:\Windows\assembly\backup.exe backup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 1684 backup.exe 1572 backup.exe 1512 backup.exe 908 backup.exe 576 backup.exe 1816 update.exe 1000 backup.exe 856 backup.exe 1504 backup.exe 1160 backup.exe 820 backup.exe 1384 backup.exe 960 backup.exe 1496 backup.exe 1292 backup.exe 1824 backup.exe 1620 System Restore.exe 1572 backup.exe 268 backup.exe 908 backup.exe 1924 backup.exe 968 backup.exe 1932 backup.exe 1816 backup.exe 1268 backup.exe 980 backup.exe 1564 backup.exe 1212 backup.exe 112 backup.exe 1668 backup.exe 1632 backup.exe 1520 backup.exe 2000 backup.exe 1808 backup.exe 532 backup.exe 1648 backup.exe 960 backup.exe 1384 backup.exe 2036 backup.exe 1692 backup.exe 1824 backup.exe 1672 backup.exe 900 backup.exe 1652 backup.exe 1784 backup.exe 920 backup.exe 968 backup.exe 1356 data.exe 1816 backup.exe 1564 backup.exe 1700 backup.exe 1952 data.exe 1088 backup.exe 1160 backup.exe 1408 backup.exe 1712 backup.exe 668 backup.exe 1632 backup.exe 2000 backup.exe 1644 backup.exe 1580 backup.exe 2044 backup.exe 572 backup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 1684 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 28 PID 948 wrote to memory of 1684 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 28 PID 948 wrote to memory of 1684 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 28 PID 948 wrote to memory of 1684 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 28 PID 948 wrote to memory of 1572 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 29 PID 948 wrote to memory of 1572 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 29 PID 948 wrote to memory of 1572 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 29 PID 948 wrote to memory of 1572 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 29 PID 948 wrote to memory of 1512 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 30 PID 948 wrote to memory of 1512 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 30 PID 948 wrote to memory of 1512 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 30 PID 948 wrote to memory of 1512 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 30 PID 948 wrote to memory of 908 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 31 PID 948 wrote to memory of 908 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 31 PID 948 wrote to memory of 908 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 31 PID 948 wrote to memory of 908 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 31 PID 948 wrote to memory of 576 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 32 PID 948 wrote to memory of 576 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 32 PID 948 wrote to memory of 576 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 32 PID 948 wrote to memory of 576 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 32 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1816 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 33 PID 948 wrote to memory of 1000 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 34 PID 948 wrote to memory of 1000 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 34 PID 948 wrote to memory of 1000 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 34 PID 948 wrote to memory of 1000 948 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe 34 PID 1684 wrote to memory of 856 1684 backup.exe 35 PID 1684 wrote to memory of 856 1684 backup.exe 35 PID 1684 wrote to memory of 856 1684 backup.exe 35 PID 1684 wrote to memory of 856 1684 backup.exe 35 PID 856 wrote to memory of 1504 856 backup.exe 36 PID 856 wrote to memory of 1504 856 backup.exe 36 PID 856 wrote to memory of 1504 856 backup.exe 36 PID 856 wrote to memory of 1504 856 backup.exe 36 PID 1504 wrote to memory of 1160 1504 backup.exe 37 PID 1504 wrote to memory of 1160 1504 backup.exe 37 PID 1504 wrote to memory of 1160 1504 backup.exe 37 PID 1504 wrote to memory of 1160 1504 backup.exe 37 PID 856 wrote to memory of 820 856 backup.exe 38 PID 856 wrote to memory of 820 856 backup.exe 38 PID 856 wrote to memory of 820 856 backup.exe 38 PID 856 wrote to memory of 820 856 backup.exe 38 PID 820 wrote to memory of 1384 820 backup.exe 39 PID 820 wrote to memory of 1384 820 backup.exe 39 PID 820 wrote to memory of 1384 820 backup.exe 39 PID 820 wrote to memory of 1384 820 backup.exe 39 PID 1384 wrote to memory of 960 1384 backup.exe 40 PID 1384 wrote to memory of 960 1384 backup.exe 40 PID 1384 wrote to memory of 960 1384 backup.exe 40 PID 1384 wrote to memory of 960 1384 backup.exe 40 PID 820 wrote to memory of 1496 820 backup.exe 41 PID 820 wrote to memory of 1496 820 backup.exe 41 PID 820 wrote to memory of 1496 820 backup.exe 41 PID 820 wrote to memory of 1496 820 backup.exe 41 PID 1496 wrote to memory of 1292 1496 backup.exe 42 PID 1496 wrote to memory of 1292 1496 backup.exe 42 PID 1496 wrote to memory of 1292 1496 backup.exe 42 PID 1496 wrote to memory of 1292 1496 backup.exe 42 PID 1292 wrote to memory of 1824 1292 backup.exe 43 -
System policy modification 1 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" data.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer System Restore.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe"C:\Users\Admin\AppData\Local\Temp\68465c52bf8a470fdcb806e0977bc25fc28ce3f7dcd26fa87047ab4d339532fb.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:948 -
C:\Users\Admin\AppData\Local\Temp\2718506770\backup.exeC:\Users\Admin\AppData\Local\Temp\2718506770\backup.exe C:\Users\Admin\AppData\Local\Temp\2718506770\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1684 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:856 -
C:\PerfLogs\backup.exeC:\PerfLogs\backup.exe C:\PerfLogs\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1504 -
C:\PerfLogs\Admin\backup.exeC:\PerfLogs\Admin\backup.exe C:\PerfLogs\Admin\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1160
-
-
-
C:\Program Files\backup.exe"C:\Program Files\backup.exe" C:\Program Files\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:820 -
C:\Program Files\7-Zip\backup.exe"C:\Program Files\7-Zip\backup.exe" C:\Program Files\7-Zip\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1384 -
C:\Program Files\7-Zip\Lang\backup.exe"C:\Program Files\7-Zip\Lang\backup.exe" C:\Program Files\7-Zip\Lang\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:960
-
-
-
C:\Program Files\Common Files\backup.exe"C:\Program Files\Common Files\backup.exe" C:\Program Files\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files\Common Files\Microsoft Shared\backup.exe"C:\Program Files\Common Files\Microsoft Shared\backup.exe" C:\Program Files\Common Files\Microsoft Shared\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Filters\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Filters\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe"C:\Program Files\Common Files\Microsoft Shared\ink\System Restore.exe" C:\Program Files\Common Files\Microsoft Shared\ink\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1620 -
C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\bg-BG\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\cs-CZ\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\da-DK\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1924
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\el-GR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1932
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1816
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\et-EE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:980
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fi-FI\8⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fr-FR\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1212
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:112 -
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1668
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1520
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\9⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1808
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:532
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1824
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe"C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\data.exe" C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\9⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1356
-
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\he-IL\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\8⤵
- Executes dropped EXE
PID:1572
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\hu-HU\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\HWRCustomization\8⤵PID:1736
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\8⤵PID:268
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\8⤵PID:780
-
-
C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe"C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\backup.exe" C:\Program Files\Common Files\Microsoft Shared\ink\ko-KR\8⤵PID:1696
-
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2036 -
C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:900
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\en-US\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:968
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\8⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1632
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\update.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\fr-FR\8⤵PID:532
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\it-IT\8⤵PID:1764
-
-
C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe"C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\backup.exe" C:\Program Files\Common Files\Microsoft Shared\MSInfo\ja-JP\8⤵PID:624
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\7⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1700 -
C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OFFICE14\Cultures\8⤵PID:952
-
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\backup.exe" C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Stationery\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Stationery\7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572
-
-
C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe"C:\Program Files\Common Files\Microsoft Shared\TextConv\backup.exe" C:\Program Files\Common Files\Microsoft Shared\TextConv\7⤵PID:1240
-
-
C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe"C:\Program Files\Common Files\Microsoft Shared\Triedit\backup.exe" C:\Program Files\Common Files\Microsoft Shared\Triedit\7⤵PID:1708
-
-
C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe"C:\Program Files\Common Files\Microsoft Shared\VC\backup.exe" C:\Program Files\Common Files\Microsoft Shared\VC\7⤵PID:1964
-
-
-
C:\Program Files\Common Files\Services\backup.exe"C:\Program Files\Common Files\Services\backup.exe" C:\Program Files\Common Files\Services\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1384
-
-
C:\Program Files\Common Files\SpeechEngines\backup.exe"C:\Program Files\Common Files\SpeechEngines\backup.exe" C:\Program Files\Common Files\SpeechEngines\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1784 -
C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe"C:\Program Files\Common Files\SpeechEngines\Microsoft\backup.exe" C:\Program Files\Common Files\SpeechEngines\Microsoft\7⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:920
-
-
-
C:\Program Files\Common Files\System\backup.exe"C:\Program Files\Common Files\System\backup.exe" C:\Program Files\Common Files\System\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1408 -
C:\Program Files\Common Files\System\ado\backup.exe"C:\Program Files\Common Files\System\ado\backup.exe" C:\Program Files\Common Files\System\ado\7⤵PID:1720
-
-
C:\Program Files\Common Files\System\de-DE\backup.exe"C:\Program Files\Common Files\System\de-DE\backup.exe" C:\Program Files\Common Files\System\de-DE\7⤵PID:1636
-
-
C:\Program Files\Common Files\System\en-US\backup.exe"C:\Program Files\Common Files\System\en-US\backup.exe" C:\Program Files\Common Files\System\en-US\7⤵PID:1212
-
-
C:\Program Files\Common Files\System\es-ES\backup.exe"C:\Program Files\Common Files\System\es-ES\backup.exe" C:\Program Files\Common Files\System\es-ES\7⤵PID:1740
-
-
-
-
C:\Program Files\DVD Maker\backup.exe"C:\Program Files\DVD Maker\backup.exe" C:\Program Files\DVD Maker\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Program Files\DVD Maker\de-DE\backup.exe"C:\Program Files\DVD Maker\de-DE\backup.exe" C:\Program Files\DVD Maker\de-DE\6⤵
- Executes dropped EXE
PID:824
-
-
C:\Program Files\DVD Maker\en-US\backup.exe"C:\Program Files\DVD Maker\en-US\backup.exe" C:\Program Files\DVD Maker\en-US\6⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:668
-
-
C:\Program Files\DVD Maker\es-ES\data.exe"C:\Program Files\DVD Maker\es-ES\data.exe" C:\Program Files\DVD Maker\es-ES\6⤵PID:1664
-
-
C:\Program Files\DVD Maker\fr-FR\backup.exe"C:\Program Files\DVD Maker\fr-FR\backup.exe" C:\Program Files\DVD Maker\fr-FR\6⤵PID:1168
-
-
C:\Program Files\DVD Maker\it-IT\backup.exe"C:\Program Files\DVD Maker\it-IT\backup.exe" C:\Program Files\DVD Maker\it-IT\6⤵PID:1552
-
-
C:\Program Files\DVD Maker\ja-JP\update.exe"C:\Program Files\DVD Maker\ja-JP\update.exe" C:\Program Files\DVD Maker\ja-JP\6⤵PID:1368
-
-
-
C:\Program Files\Google\backup.exe"C:\Program Files\Google\backup.exe" C:\Program Files\Google\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088
-
-
C:\Program Files\Internet Explorer\backup.exe"C:\Program Files\Internet Explorer\backup.exe" C:\Program Files\Internet Explorer\5⤵
- Suspicious use of SetWindowsHookEx
PID:1644
-
-
C:\Program Files\Java\backup.exe"C:\Program Files\Java\backup.exe" C:\Program Files\Java\5⤵PID:1352
-
-
C:\Program Files\Microsoft Games\backup.exe"C:\Program Files\Microsoft Games\backup.exe" C:\Program Files\Microsoft Games\5⤵PID:2040
-
-
C:\Program Files\Microsoft Office\backup.exe"C:\Program Files\Microsoft Office\backup.exe" C:\Program Files\Microsoft Office\5⤵PID:1396
-
-
-
C:\Program Files (x86)\backup.exe"C:\Program Files (x86)\backup.exe" C:\Program Files (x86)\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1648 -
C:\Program Files (x86)\Adobe\backup.exe"C:\Program Files (x86)\Adobe\backup.exe" C:\Program Files (x86)\Adobe\5⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1672 -
C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\6⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1816 -
C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Esl\backup.exe" C:\Program Files (x86)\Adobe\Reader 9.0\Esl\7⤵PID:112
-
-
-
-
C:\Program Files (x86)\Common Files\data.exe"C:\Program Files (x86)\Common Files\data.exe" C:\Program Files (x86)\Common Files\5⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Program Files (x86)\Common Files\Adobe\backup.exe"C:\Program Files (x86)\Common Files\Adobe\backup.exe" C:\Program Files (x86)\Common Files\Adobe\6⤵
- Suspicious use of SetWindowsHookEx
PID:1580
-
-
C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe"C:\Program Files (x86)\Common Files\Adobe AIR\backup.exe" C:\Program Files (x86)\Common Files\Adobe AIR\6⤵PID:876
-
-
C:\Program Files (x86)\Common Files\DESIGNER\System Restore.exe"C:\Program Files (x86)\Common Files\DESIGNER\System Restore.exe" C:\Program Files (x86)\Common Files\DESIGNER\6⤵PID:960
-
-
C:\Program Files (x86)\Common Files\microsoft shared\backup.exe"C:\Program Files (x86)\Common Files\microsoft shared\backup.exe" C:\Program Files (x86)\Common Files\microsoft shared\6⤵PID:1296
-
-
-
C:\Program Files (x86)\Google\backup.exe"C:\Program Files (x86)\Google\backup.exe" C:\Program Files (x86)\Google\5⤵
- Executes dropped EXE
PID:568
-
-
C:\Program Files (x86)\Internet Explorer\backup.exe"C:\Program Files (x86)\Internet Explorer\backup.exe" C:\Program Files (x86)\Internet Explorer\5⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft Analysis Services\backup.exe"C:\Program Files (x86)\Microsoft Analysis Services\backup.exe" C:\Program Files (x86)\Microsoft Analysis Services\5⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft Office\backup.exe"C:\Program Files (x86)\Microsoft Office\backup.exe" C:\Program Files (x86)\Microsoft Office\5⤵PID:1092
-
-
-
C:\Users\backup.exeC:\Users\backup.exe C:\Users\4⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1564 -
C:\Users\Admin\backup.exeC:\Users\Admin\backup.exe C:\Users\Admin\5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Users\Public\System Restore.exe"C:\Users\Public\System Restore.exe" C:\Users\Public\5⤵PID:1568
-
-
-
C:\Windows\backup.exeC:\Windows\backup.exe C:\Windows\4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1712 -
C:\Windows\addins\backup.exeC:\Windows\addins\backup.exe C:\Windows\addins\5⤵PID:1612
-
-
C:\Windows\AppCompat\update.exeC:\Windows\AppCompat\update.exe C:\Windows\AppCompat\5⤵PID:1840
-
-
C:\Windows\AppPatch\backup.exeC:\Windows\AppPatch\backup.exe C:\Windows\AppPatch\5⤵PID:1268
-
-
C:\Windows\assembly\backup.exeC:\Windows\assembly\backup.exe C:\Windows\assembly\5⤵PID:584
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe" C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:576
-
-
C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exeC:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\update.exe C:\Users\Admin\AppData\Local\Temp\mozilla-temp-files\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exeC:\Users\Admin\AppData\Local\Temp\WPDNSE\backup.exe C:\Users\Admin\AppData\Local\Temp\WPDNSE\2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:1000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5a6604d7c08c987750d9cf26f6c421c04
SHA17401bc19005bf5a9d806c2e8d9574b43cdd1a5fb
SHA25674f60c4e3400dc60ad7e2ada75c59d7324243013a4390f8c2181ab8aa827b816
SHA512094c7becf8c2483987599111d07844fc5592320065f9798c9015b5c7e6042b66143f933a02c9111d43bf012074582378d31d7f2b4034abd74c32c9216b9995d3
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD54a8ecdadf2dbffa750b19be44a380780
SHA15cd8ee8978f9db92b90e03d5570832c3322844c6
SHA256e83c04f408897bbdeff60ede44afb4a815c1c374adb8cbf2119a474c4fd74c54
SHA512c13327db914e60acead7b4fb09f592c5ad30cdccd98b34842f24ce1bb55459eeeaec734c68f0eff2042f21d3da1e50be921693dc712c6d7a714f8391d8306d07
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5eeee7722d92aa6266710f778328816e5
SHA155bdcc34b40e91c9e2e50c3eccce216bdce1f6af
SHA2560ab35b42ea21aba49b864b5f531768c23f481bafd78dba5177d2256ebb5dfd3e
SHA512f9e98359a8f9e076a87b22e6d6bad4407199805590401e1039dcbff5f2ae557b79136257941e18346a29c674c02df4ee95903b101ca1a6cb2c6e8b29d2daae70
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5aa60ede069dda93504b689665316c0b5
SHA1aa2eeb28feba5df09117520c4e184b5639d355d1
SHA25641ba4df839dff1a39ad048a48e40f3919253ee1b98027fbf067d9bb64ba92f3e
SHA512b5868df0e24f3f34c99c8f35b6aec081f2a5d909f542256978a7b0f56336116101bedfb11e81d96e82e88cd5fcb2e96f09e3edb23feff6bf193a93c14fc1117e
-
Filesize
72KB
MD5aa60ede069dda93504b689665316c0b5
SHA1aa2eeb28feba5df09117520c4e184b5639d355d1
SHA25641ba4df839dff1a39ad048a48e40f3919253ee1b98027fbf067d9bb64ba92f3e
SHA512b5868df0e24f3f34c99c8f35b6aec081f2a5d909f542256978a7b0f56336116101bedfb11e81d96e82e88cd5fcb2e96f09e3edb23feff6bf193a93c14fc1117e
-
Filesize
72KB
MD5a6604d7c08c987750d9cf26f6c421c04
SHA17401bc19005bf5a9d806c2e8d9574b43cdd1a5fb
SHA25674f60c4e3400dc60ad7e2ada75c59d7324243013a4390f8c2181ab8aa827b816
SHA512094c7becf8c2483987599111d07844fc5592320065f9798c9015b5c7e6042b66143f933a02c9111d43bf012074582378d31d7f2b4034abd74c32c9216b9995d3
-
Filesize
72KB
MD5a6604d7c08c987750d9cf26f6c421c04
SHA17401bc19005bf5a9d806c2e8d9574b43cdd1a5fb
SHA25674f60c4e3400dc60ad7e2ada75c59d7324243013a4390f8c2181ab8aa827b816
SHA512094c7becf8c2483987599111d07844fc5592320065f9798c9015b5c7e6042b66143f933a02c9111d43bf012074582378d31d7f2b4034abd74c32c9216b9995d3
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD5db7b299c2003a906dda3ccbde6120e29
SHA13af0d1ac3536c3f266f7ca1a567671fa0a0a70ba
SHA25612706a8cdf331b470683e7ed3f1716a1cb82be252d9d92a42b23e1e6cc172193
SHA512c48381cfbc4ab50a924f1a5b5ca7cdd115eec83ed58a28c1deed8516816f86106d833328541a77382871d1d0c00ce73ec080fe1766daf64bd571a1e0dc3534ca
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD59c9c071ba139d281ee870160c6ff072b
SHA159c6b693e6f8ea01ecff5ed562bc2c16adbdafb1
SHA25691d2b184e241fc53929879fb97504464db4b535a44a5f1e9f1bcfb48f55c0e0a
SHA512f6e409c5917ff03fa173c380e9342cc8e1ac6736137aaa93af33f8410cbc4399e8ba8b481d9b21e3f67a6dff8e3228e8a42c06c1f1598c98a791a22f40dfe438
-
Filesize
72KB
MD54a8ecdadf2dbffa750b19be44a380780
SHA15cd8ee8978f9db92b90e03d5570832c3322844c6
SHA256e83c04f408897bbdeff60ede44afb4a815c1c374adb8cbf2119a474c4fd74c54
SHA512c13327db914e60acead7b4fb09f592c5ad30cdccd98b34842f24ce1bb55459eeeaec734c68f0eff2042f21d3da1e50be921693dc712c6d7a714f8391d8306d07
-
Filesize
72KB
MD54a8ecdadf2dbffa750b19be44a380780
SHA15cd8ee8978f9db92b90e03d5570832c3322844c6
SHA256e83c04f408897bbdeff60ede44afb4a815c1c374adb8cbf2119a474c4fd74c54
SHA512c13327db914e60acead7b4fb09f592c5ad30cdccd98b34842f24ce1bb55459eeeaec734c68f0eff2042f21d3da1e50be921693dc712c6d7a714f8391d8306d07
-
Filesize
72KB
MD5607f780f9bb282cf7ec25a938286d12a
SHA104fe672a09aa7f9bf2e706091b736967f4bc4742
SHA256e2b665ee053b274611ab971931690bd28d7901c2f84246029e66e568bc8e4c6f
SHA512fa8de4c137148d828b13df4036d30e106bc9e3c9dc74804fd0c7987140341930e3c281d7ad2759bbdec2597b9e5767c4f2b7de9e145b67c4f6ce31f8c25c9e38
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD5464d03a15b13caaa41ae4db0b2de76b3
SHA1da1c35e802789bc4de2a3b311742f3f689684e8b
SHA256eb781cbae8ffcac83e35f57876858b49251d3985b0d0b04c3858e057a35face1
SHA512a4bd14cd76a3b2c92bce5652a23817d3cf3f6357562f6af7d6674ab8ebcc240ee41593998fd2b121f577b548da01c08007cbba4d78c86fc8ba068c58f9b557ad
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD50323b9f6ff3eab0de039938c117e294d
SHA1e423ae73edff11d579b6b3d9eaf6b8f82051304c
SHA2564fd2f980feea37290f5095f6df83040c06e84a32df726de0fc5e351294af6de4
SHA51224248a26efcf32452d0304cd052dfc9317569f87be82c04ed81596ac9fca3c4b4f0f6ecf96285f453c437235f60f71deffd69a1b8dec102fd44dbdc74fc65026
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x64 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
\Users\Admin\AppData\Local\Temp\Microsoft Visual C++ 2010 x86 Redistributable Setup_10.0.40219\backup.exe
Filesize72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5eeee7722d92aa6266710f778328816e5
SHA155bdcc34b40e91c9e2e50c3eccce216bdce1f6af
SHA2560ab35b42ea21aba49b864b5f531768c23f481bafd78dba5177d2256ebb5dfd3e
SHA512f9e98359a8f9e076a87b22e6d6bad4407199805590401e1039dcbff5f2ae557b79136257941e18346a29c674c02df4ee95903b101ca1a6cb2c6e8b29d2daae70
-
Filesize
72KB
MD5eeee7722d92aa6266710f778328816e5
SHA155bdcc34b40e91c9e2e50c3eccce216bdce1f6af
SHA2560ab35b42ea21aba49b864b5f531768c23f481bafd78dba5177d2256ebb5dfd3e
SHA512f9e98359a8f9e076a87b22e6d6bad4407199805590401e1039dcbff5f2ae557b79136257941e18346a29c674c02df4ee95903b101ca1a6cb2c6e8b29d2daae70
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e
-
Filesize
72KB
MD5d8edb2778d4b0e45081d402320e54888
SHA140406efd4e54fd50d5d454d0a0d58d99ecafc263
SHA2563c76503b6f6a90284272bb08a8f8e9820a72b07290c83b411eca3e974bfb343e
SHA51287d50e1e54c010bb76c06ef8457763e89945ffb54486a9dfa2a203ea9cd902a62b34d4b447d9d46e2015aac0e7256c5e4802d645559e984190047fcc4b3e1f7e