Analysis
-
max time kernel
230s -
max time network
255s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
HncKilitKurulum.exe
Resource
win10v2004-20240802-en
General
-
Target
HncKilitKurulum.exe
-
Size
47.9MB
-
MD5
8839899040d8240442022b285f9107cd
-
SHA1
6aa6027c0ba1e17ab19a4fe56d10f6512f4fa0e1
-
SHA256
28323aaa505d1969ad79405c5b2dfdc6ee675199f6d6ae82729eea8e2309cf9d
-
SHA512
bcbaad0198d5b424aada39a6cfb13db52a98cca28c1159625db8ae07ceeda1e05d64bfb04d9cb733a629ea075256ce6f43c1e6394303d43e29620756c5207ebe
-
SSDEEP
786432:s3AhkyNjhcxCEFtpG3epSISLVav/mVAJxSsKRV8u34E3es5UPL6IIYDeofNPkG5p:5hLtSxC+G38SvLQkA6sKnH3d5sT3ffDH
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" svchosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "2" svchosts.exe -
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation HncKilitKurulum.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation GPU Driver R3.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation svchosts.exe -
Executes dropped EXE 5 IoCs
pid Process 2928 vcredist_x86.exe 4556 vcredist_x86.exe 4576 GPU Driver R3.exe 1976 svchosts.exe 4140 CefSharp.BrowserSubprocess.exe -
Loads dropped DLL 17 IoCs
pid Process 4556 vcredist_x86.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 4140 CefSharp.BrowserSubprocess.exe 4140 CefSharp.BrowserSubprocess.exe 4140 CefSharp.BrowserSubprocess.exe 4140 CefSharp.BrowserSubprocess.exe 4140 CefSharp.BrowserSubprocess.exe 4140 CefSharp.BrowserSubprocess.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{f65db027-aff3-4070-886a-0d87064aabb1} = "\"C:\\ProgramData\\Package Cache\\{f65db027-aff3-4070-886a-0d87064aabb1}\\vcredist_x86.exe\" /burn.runonce" vcredist_x86.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe File opened (read-only) \??\D: explorer.exe -
pid Process 4140 CefSharp.BrowserSubprocess.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOTEPAD.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CefSharp.BrowserSubprocess.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HncKilitKurulum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vcredist_x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GPU Driver R3.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe -
Kills process with taskkill 2 IoCs
pid Process 4996 taskkill.exe 4136 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\GPU SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\GPU SearchApp.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{B44E37F7-354F-437E-B5BA-A121C28519D7} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12\Dependents\{f65db027-aff3-4070-886a-0d87064aabb1} vcredist_x86.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "56" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133670752940375188" explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search\ = "23" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{6233214F-5689-422C-BDA6-B84AF528774F} explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_x86,v12 vcredist_x86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}\ = "{f65db027-aff3-4070-886a-0d87064aabb1}" vcredist_x86.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings HncKilitKurulum.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{0F6BCF74-4830-456D-9E2B-1B4204002C91} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "152" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search\Total = "56" SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{2B7BB88E-738D-492F-A149-EB153EA0EA52} explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202020202 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "185" SearchApp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}\Dependents\{f65db027-aff3-4070-886a-0d87064aabb1} vcredist_x86.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{f65db027-aff3-4070-886a-0d87064aabb1}\DisplayName = "Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501" vcredist_x86.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\microsoft.windows.search SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\windows.search SearchApp.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3600 NOTEPAD.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 1976 svchosts.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 4576 GPU Driver R3.exe 1976 svchosts.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4616 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 1472 vssvc.exe Token: SeRestorePrivilege 1472 vssvc.exe Token: SeAuditPrivilege 1472 vssvc.exe Token: SeBackupPrivilege 3612 srtasks.exe Token: SeRestorePrivilege 3612 srtasks.exe Token: SeSecurityPrivilege 3612 srtasks.exe Token: SeTakeOwnershipPrivilege 3612 srtasks.exe Token: SeBackupPrivilege 3612 srtasks.exe Token: SeRestorePrivilege 3612 srtasks.exe Token: SeSecurityPrivilege 3612 srtasks.exe Token: SeTakeOwnershipPrivilege 3612 srtasks.exe Token: SeDebugPrivilege 4576 GPU Driver R3.exe Token: SeDebugPrivilege 1976 svchosts.exe Token: SeDebugPrivilege 4140 CefSharp.BrowserSubprocess.exe Token: SeDebugPrivilege 4136 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5052 explorer.exe Token: SeCreatePagefilePrivilege 5052 explorer.exe Token: SeShutdownPrivilege 5008 explorer.exe Token: SeCreatePagefilePrivilege 5008 explorer.exe Token: SeShutdownPrivilege 5008 explorer.exe Token: SeCreatePagefilePrivilege 5008 explorer.exe Token: SeShutdownPrivilege 5008 explorer.exe Token: SeCreatePagefilePrivilege 5008 explorer.exe Token: SeShutdownPrivilege 5008 explorer.exe Token: SeCreatePagefilePrivilege 5008 explorer.exe Token: SeShutdownPrivilege 5008 explorer.exe Token: SeCreatePagefilePrivilege 5008 explorer.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4556 vcredist_x86.exe 1976 svchosts.exe 1976 svchosts.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1976 svchosts.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5052 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 5008 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe 4616 explorer.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4644 StartMenuExperienceHost.exe 3936 StartMenuExperienceHost.exe 1612 SearchApp.exe 2800 StartMenuExperienceHost.exe 4916 SearchApp.exe 4988 StartMenuExperienceHost.exe 628 SearchApp.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 316 wrote to memory of 4124 316 HncKilitKurulum.exe 88 PID 316 wrote to memory of 4124 316 HncKilitKurulum.exe 88 PID 316 wrote to memory of 4124 316 HncKilitKurulum.exe 88 PID 316 wrote to memory of 2928 316 HncKilitKurulum.exe 91 PID 316 wrote to memory of 2928 316 HncKilitKurulum.exe 91 PID 316 wrote to memory of 2928 316 HncKilitKurulum.exe 91 PID 4124 wrote to memory of 3544 4124 cmd.exe 92 PID 4124 wrote to memory of 3544 4124 cmd.exe 92 PID 4124 wrote to memory of 3544 4124 cmd.exe 92 PID 316 wrote to memory of 3600 316 HncKilitKurulum.exe 93 PID 316 wrote to memory of 3600 316 HncKilitKurulum.exe 93 PID 316 wrote to memory of 3600 316 HncKilitKurulum.exe 93 PID 2928 wrote to memory of 4556 2928 vcredist_x86.exe 94 PID 2928 wrote to memory of 4556 2928 vcredist_x86.exe 94 PID 2928 wrote to memory of 4556 2928 vcredist_x86.exe 94 PID 4576 wrote to memory of 1976 4576 GPU Driver R3.exe 115 PID 4576 wrote to memory of 1976 4576 GPU Driver R3.exe 115 PID 4576 wrote to memory of 1976 4576 GPU Driver R3.exe 115 PID 1976 wrote to memory of 4136 1976 svchosts.exe 116 PID 1976 wrote to memory of 4136 1976 svchosts.exe 116 PID 1976 wrote to memory of 4136 1976 svchosts.exe 116 PID 1976 wrote to memory of 4996 1976 svchosts.exe 117 PID 1976 wrote to memory of 4996 1976 svchosts.exe 117 PID 1976 wrote to memory of 4996 1976 svchosts.exe 117 PID 1976 wrote to memory of 4140 1976 svchosts.exe 120 PID 1976 wrote to memory of 4140 1976 svchosts.exe 120 PID 1976 wrote to memory of 4140 1976 svchosts.exe 120 PID 1976 wrote to memory of 5052 1976 svchosts.exe 132 PID 1976 wrote to memory of 5052 1976 svchosts.exe 132 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\HncKilitKurulum.exe"C:\Users\Admin\AppData\Local\Temp\HncKilitKurulum.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\local\Intel HD Graphics\setup.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "UpdateProfile" /sc onlogon /it /tr "C:\Users\Admin\AppData\Roaming\..\local\GPU Driver R3\GPU Driver R3.exe" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3544
-
-
-
C:\Users\Admin\AppData\local\Intel HD Graphics\setup\vcredist_x86.exe"C:\Users\Admin\AppData\local\Intel HD Graphics\setup\vcredist_x86.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\local\Intel HD Graphics\setup\vcredist_x86.exe"C:\Users\Admin\AppData\local\Intel HD Graphics\setup\vcredist_x86.exe" -burn.unelevated BurnPipe.{D21703D0-62B9-4FBE-A604-33D2A49B191A} {6A33D1F1-89CB-444E-966A-6526A088486B} 29283⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4556
-
-
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\local\readme.txt2⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3600
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2872
-
C:\Users\Admin\AppData\Local\GPU Driver R3\GPU Driver R3.exe"C:\Users\Admin\AppData\Local\GPU Driver R3\GPU Driver R3.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Intel HD Graphics\svchosts.exe"C:\Users\Admin\AppData\Local\Intel HD Graphics\svchosts.exe"2⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /F /IM explorer.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Users\Admin\AppData\Local\Intel HD Graphics\CefSharp.BrowserSubprocess.exeCefSharp.BrowserSubprocess.exe --type=renderer --no-sandbox --disable-databases --primordial-pipe-token=91E7E7ADDBF6E5E850B363BC4E555A9A --lang=en-US --lang=en-US --log-file="C:\Users\Admin\AppData\Local\Intel HD Graphics\debug.log" --enable-system-flash=1 --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --mojo-channel-token=99CD4D0864E4D7E945538B6E0B485614 --mojo-application-channel-token=91E7E7ADDBF6E5E850B363BC4E555A9A --channel="1976.0.1988279776\608154361" --mojo-platform-channel-handle=3016 /prefetch:13⤵
- Executes dropped EXE
- Loads dropped DLL
- Network Service Discovery
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5052
-
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4644
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5008
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3936
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1612
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SendNotifyMessage
PID:4616
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2800
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4916
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
PID:1844
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4988
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:628
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:672
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3540
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2420
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1052
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4312
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4772
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3372
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4516
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:1656
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:3092
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:1520
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize471B
MD524fe50e8b385cf56ba85acd8d0195380
SHA1770591ae4b80837c2f4b0092ceb1f9312ec3143d
SHA25603be0b1d87c40f15bdf7f21f8c42f217c2076dfb81bf7ba65f43dbcca8b9c218
SHA5121d748894b17bd056ec14c5d3fa5020d4be72bcaa55b3f786186323fcf12868c75428398450265955c61dbde56358cd9dc8a73715e0763a7d377f52e0af98a466
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9
Filesize420B
MD5f3462e1a0211845f4010e53d9fbc2e68
SHA16105c1218b1e97651eae284d63ac4483547b4484
SHA256fce3350defe9ff132ffef0a1c0d0b86ae6d4f94f21c79a56b5d6131c5330c3d3
SHA5124da14c59b9346d0ea7e7f186d4cd0ba8bf1e313754a05c85180bb0a4f7dd53ef2db457f44fe0affa3b9c53d1088ded164a5d4b5506eb21664bc9ecd664e9ff4e
-
Filesize
29KB
MD5532891da12361d69c9e6b1fa3ee6bbb6
SHA18ab719b474d7df505d6590a73f12bbf0fc4cec2a
SHA256c98003a6016daca2cea8e250522bc5c749d749e6465c46a4c09c3bf76a9d9c35
SHA512b98b78543d6d285f06496b18e66fb0bf0748e3f92297e9b16b1cdd4f88ea5e6128780542ad6707397876afdae13eea23ddc9b8e2be9fde5b45267b2a9925ad8f
-
Filesize
784KB
MD59b8bc024052d02fe80fa78149235f063
SHA177b5b584546374fd34ccd1a63fcd6ddfde2847d5
SHA256ff00fafd989e23fd6f4b8d8050223ad8e2acaf20cf4a9a7dbed57409abacb996
SHA512057b035760c1dfd7869884dd3541ac9e26b9fb44c3e8bf583819031255d876f4450d808908e4fa85ae8355a908c4b772e1a533bc0358b501068174e82bfd49ff
-
Filesize
8KB
MD5c479ec4e58713b0fd2a4e37cbccd1e0d
SHA141fc23a115903e7b70ed3244f9bc09eb081995da
SHA2566f09b60d209acdc5a0d28f797b6119ed57e9350c11f4973f6f0245791257d8bd
SHA512c460e7c488d4814b5fd3d941a8b0685bae96e610e997df90a542f72d1de9870286cff1ab9727e63bb398e89c8a8b9b5ccec60fc4707f6230f551830cde02462f
-
Filesize
1.1MB
MD555c8735541574846027b95c83763d8b3
SHA1002c23cac4a4d9af0499a1e25358d8a64420e1cd
SHA256da64e7cb27e97b9bde513e3d8e3f0568878f9800c4ecb356056ac437ddabd3b3
SHA512e6cf99f596618905cf90a87b7dd87596c637a34635ee100278defc4a8ba5a280402a6339e159735570863c336a46ffb6bcb1b60a4e0ca48af07629925fb91ad7
-
Filesize
22KB
MD5353e647b00e362babf779a7c3b064777
SHA16e23b5fdc7a49fb3a83a96741cff41623387af56
SHA256eafd2338d12debaeaaa13fc163731c33418ce4ddffae86cc867dd45aee0abc37
SHA512bd187a5ee970b0c31432341555bbba01abce0937f7c3982e01b9f1ee9f418b9b2739693efbedc35379bccbf9f07c88f17e637804957fb890ec0b0646947a6d90
-
Filesize
170KB
MD55ec072e6687d6e7c59b1ef90e82c5491
SHA195a0f56dc195ac36ce59b566855bd7714497de94
SHA256e5a0b964c6c38e7f992194bbb5f97ed43cc57c7c2f12a3b720246f5a06538472
SHA5121f49b550755440b0f5f8f5c3cf7ac5c6891f3ce10fdfff8eb031707a5f8e3ff490aa65f7aa312883f033d0adfc57fa34c4cbdf26bbb751c35e4375768f3fb8d0
-
Filesize
514KB
MD5c53737821b861d454d5248034c3c097c
SHA16b0da75617a2269493dc1a685d7a0b07f2e48c75
SHA256575e30f98e4ea42c9e516edc8bbb29ad8b50b173a3e6b36b5ba39e133cce9406
SHA512289543f5eea472e9027030e24011bea1e49e91059241fe6eb732e78f51822313e47d1e4769fa1c9c7d6139f6a97dcfef2946836b3383e8643988bf8908162fb9
-
Filesize
1.4MB
MD5290f0060612f305b075f92b7fd1ad036
SHA19b947244282c3f202c3d5736fbac23d4b33818ab
SHA2569421cb1bea1df4cb7658e88ca0fb3b5ee748ce737381586fcf3d6f5f25ee557e
SHA512d4e0b56aa21b1ad747eb173e09c5a97292d21e3960ffb010607eaed845f9e9d55afd628ba22224187149dfedd99c45b96a1472e659c4ee6fdacdc4c8d67fddf0
-
Filesize
146KB
MD50a20cb807b4c606db89fe14cae041885
SHA1656620888ad1f2b5e1684ab0608cf3c8fc503fca
SHA2567b1b1aea2ce508f5651974cf6bb34290ed15cc23b697d233d061ceb331735a67
SHA51225cc0e2ff876a1fc04d1a0f5906fdc6d91421bdff9d70774990365c80728f9a0d619927a5d14d91000a630c22f9fbebd397f53808e38fee80a0b0bf1b5f7864d
-
Filesize
236KB
MD5a3d62f9485070ca84ca074a12b3fb4e8
SHA10a40fb30724db85a92c20cd879dbc1a57f91888a
SHA2564abcc62dd92e3ba0d19d843f973b2ad5c17f9d51001807ecef411cb472cd9d69
SHA5125af90bd4863801a363f72a6d98386ca597943198209c25c5aaae361375096004137e1891e0b622e7d8a31abd2df9db8c3da3e08aa221858ee546038ec717e0ea
-
Filesize
4.4MB
MD5a60a12468870b84fffee8d9dea64ff74
SHA13f88552ee08d9456f2bcb0f1cd616eade814192a
SHA2560c841b611f4414bd344dd41c83febadc1d84dd574a8b9796cfeff3477cd85e98
SHA5126e3d8e34bca09851959c5b749a71beb6d0648b72a4e345981d1814f557a55e3245aea456054d9dd279feb6772fe873a9803c742ec9997a0352a0da4eaba4ce55
-
Filesize
100KB
MD54bf0955cc60b370ee210596e5c222124
SHA1b4f9e3656d376f85778dd54a967fc719fdb20826
SHA256266d14e12b948b258b960d34fce35939fcac90b38c44d00dcd6a5ee4823be8da
SHA5120eaceb3eb83766021990b294530914356c5e3a6ee9a620b8119b6a5f53d21a8cb3649fc685180b8aa1152753ee8912cd29a216443e301fef07ab1a616c93f68e
-
Filesize
4.7MB
MD5ac2645b5ec9473777f572364a355d69f
SHA189c4a049a4742c91d984aeb9c0e11bbdd2baccdb
SHA2563cdce084e87b9cabfb3f66d107e209f8537d8f2005a582b6295daa4ec75c3a56
SHA5122e9368f74f46d70bd26a70b26312c43dca9f6579e67ea9189154a4c3b0ea94912993756fec163d285fe8ae1f361d67c1343115e20dbd9e578e34341d81957166
-
Filesize
9.7MB
MD53ed56e55ff45ab973ffc483e5d483a5a
SHA15d9d39c80054ed315fa4cac23cd956e3121ce5d0
SHA25622b4b162fa9c1a35d086df4b2532485c0ddfee4649de8519cfc52a09f749b8ea
SHA512b8998b76b2691941ea724f404c9b95bfb1593e6fb17d0d7fd57d04069b180a01eec82934357c2dfd48958b6d3d4e3489b111f7c0078134d300710d76f9ee3daf
-
Filesize
49.4MB
MD5e5f94b992adddb5a08b36bfab4420e0f
SHA1f3fa6ab02f42e1e5215916b87d3769de9771aae1
SHA2560eb3b5b30229c50abed6834cfbb29cb5fb1e48f0975609f40c85a421c33bf6e4
SHA5120b42d1e601cd3fff17d27bb68e80b8cb9f38591711b74135a944f32af5057dae9259d0c59357bc93b52bde1c625e1b394c8261e59f36a43b37aa764ef38f5dff
-
Filesize
41KB
MD515d6f4cd21f8bd8c817d39654b48810b
SHA1c2b5fbbe552eb8c2046f94be334712c4d30ec358
SHA2560cbf9704feaa5e37efd02ccce38d91c0c70da6083a5ff202cdef0c5bb86c3e81
SHA5124fc94a02bc651dc8607a714d24a89a5e7c2420b369c674090796290bacc3a0eef70fdf6ae316525d14e3fd5f3868066c5ee26b67c858af608f994dd415ddfe52
-
Filesize
358KB
MD503dc57f8a76d2a781ba2d8b3777b58d1
SHA1b74c91f6f85cc5672f7d5a27a9d11ee0c10f0429
SHA256f0db322cf97c0ca0e51d30d447a463c9d93d4869aa7671036741b62d1f4de86d
SHA512774947829eb47480a7f9839c4fbe1679d6322dc2b4f1769f26b53d578d1a0a62c4aaa5f4f2b690df006c592057a6b3909e650b3976fef2f9ae1e683dc100976f
-
Filesize
6.2MB
MD50fc525b6b7b96a87523daa7a0013c69d
SHA1df7f0a73bfa077e483e51bfb97f5e2eceedfb6a3
SHA256a22895e55b26202eae166838edbe2ea6aad00d7ea600c11f8a31ede5cbce2048
SHA512729251371ed208898430040fe48cabd286a5671bd7f472a30e9021b68f73b2d49d85a0879920232426b139520f7e21321ba92646985216bf2f733c64e014a71d
-
Filesize
633KB
MD54fde446a9303d60f7eb76438cab8ba30
SHA1f3be70d4ca04d5aad4b5b3b70af82083bbebd4e2
SHA256b4ee1ceb6771bf43590a6bfb34c5b7c7c77d1476a831529e61703ca64e1a1626
SHA5126f9c95ec3834e847246a57c46079435cf8dc99d005b3f893cec8bb215fbc0b2858192fca8fb52054aa8639c0da4e4cece7aca6c6dd0fe77d27e21139f946338c
-
Filesize
249KB
MD5c2b9e98fe0d9511cbbb5a15d8dd595ba
SHA15dfee064a519c7124e6f0782c83cbad446cd9c8e
SHA256bb931a235b0583f90721cfd741724a824c36e3a4f17189b65c7f9e03ab072e7c
SHA512891f03960691c2eb03fedcdc86b0beac94de7af2d762717f0dc635dfc20d7c45e01a07fc7df56ef0a1b0dec0babc68c9f919d3502fac7c2d81db04247397ce73
-
Filesize
187KB
MD587c73233b7cde293320fcf9f591023fa
SHA144516eb0852b5d02a39ef1ed06807d2fded4cc16
SHA25614f0ff866b3d63750c3fb44a4ab6542b83032fd3b2a5fe61be5e9bbd122ae775
SHA512d845f1f88082908c52f32355caf97fdd3090e7ba20900640eb288295e125caffd6359afa5b99d833f706c4d1abb3923f73ee0781a3262162b990d3456f941c8b
-
Filesize
238KB
MD5c113dae7d93b3c458ec19f9f2dda0635
SHA136593c35cd46300e3638667fe328d0cb4242ca8a
SHA2567031e6f7b66d2a981db0a7cfca8c6e6d2c9f0308000be51b961d51ca43388b61
SHA512214471b48e5cbf4e04f3743e90569343413bb0dcd434871421cffb32ec1f98255d95a14868a190a32d5285b81472397e5e9be6684c001f81b05b0d78f23f9946
-
Filesize
125KB
MD53d4e7eb5e174e76ba8278385c0038ee0
SHA1cac3882f387bf732ae1837e07e5973795274b1e3
SHA256e9d712991da964052a53a396e07a2acb49d1f2bedfb1d5486d673a184640b9b5
SHA51249d977f8dbf6f691dfc7109fced92bf42fa3d8f6e8c611c9b229af5707c843e79f5e4de05bdd3244673ca8eb1a1d145f4c90f10e06bab08950150f5829ddf0e0
-
Filesize
81KB
MD5e6be705232cb640540a506b8543ac903
SHA19ee64cca4d06306d28c5c5ff69540667b1f7cc71
SHA2562c15a3cc5d36e0b2b336fcac447e898dc1627c22d103a7e54fb4c288b8ab0aad
SHA512777a2749c621d61f0382aa840bafed6202ae8d0b9f47afdd31b21c8ea54928e85d41f11c2e64d25bd345f618f8d658cf863cf72d0ba2a8297af0b5759c154515
-
Filesize
176KB
MD548192aa814ce01bce7d7f964c3677445
SHA135ebba9fc4623216918e7f2454476684b0c174ee
SHA2566d888d93733e6b0265474cd9e4244cc1b913cbf63202a51cf0f461e47fd9ffc7
SHA5128da60f29d607525abc530dfabe2e0a22859c56cf5884a34c0833417c50971a6938cc1a1715c7d114cf2f93b111ae1fbebc6c209f3a1df7dee943af88c3ebe366
-
Filesize
235KB
MD551e1736381f2fa0c3f766620290d8e2c
SHA10b5a10b1b2e7dd058a5dbc0f38c366c26261178c
SHA256490ba9fce7c54e206a4bd3f13d83da6f91e391e3b35acf94edb9360b123b217d
SHA51273bb96d4d4e2420e4b6115cf155c21594aacade19da6d219ee8852fbe9d490de805220bf26670a72084bc26f68e775114655b034a5020aa596cf460c60d50b34
-
Filesize
133KB
MD53b2c42059311dba9cd48889ffe0354d7
SHA12e5d935d9b11900bd1f4f7b5254077f104a1a6a9
SHA25682b095e6143001a04352fd95dee88a521063ada403d372b64039b1827cd1f2ec
SHA512fe4eea05268f2df69a82a471987c1587d9cd984de044a18971642815c3386faa5c32cc6edc85a43e306f266de6bd170a403817a964ecf6fd1de6e5523676c9d9
-
Filesize
80KB
MD55dac5c54bcf3aa47d8ed3bdb6fd9ca5b
SHA148df8d1bccda43414f06ed974f0f8df11e6296b6
SHA256c3fed7afb832eb892acaf44a9634dd67a902f6dc6c050b3fcc1f9eeef8f2a28a
SHA5125db9da8c08024e4e3e9dced90befefe1ecd2e6ca3cdfb7eadbb24078f34dd4469fb1cd5d1d448f35c8cde233220896764d3c202b64d08885fe1ff4b9acc9bd9a
-
Filesize
162KB
MD52d6409c1bfc0837875b9f3e8b8418768
SHA1760080aa0f2592cdc5305ca4b82dcc46fb1ecbb3
SHA25647335b0c1281f2a69b60b7ff21d6a20b7e1d80e91abc5a39ab442bf8d72b08c0
SHA512f2e2789e02523fd767cbe3ef0752f3fbed5950898efea14c50c10f555c25c92862459269f24a4f0382d36c5b4beaf4855243bc6a786bccb73ecdaff358093630
-
Filesize
3.1MB
MD5e23784b983e68a61aa9a06649d90cbf9
SHA1372b4ccd6af4d148f9b87a16c7fdd1ab83b70473
SHA2562cbd5ce54cbc5e24e3ffdb666836db5b81a97613fa4ac02c565d29c6053c597b
SHA51205b3a6c13f478b41b8fd1559dd7da858b474f8d36d9673cfac0721926b70d25c0015c6c670253df24b9130051dc5fc90123cbea7b58f4f53ff8ba9702ab40ac4
-
Filesize
534B
MD52a07c0b25626913100d59c46fa2deb07
SHA1152426f195efcf28062e726df2dc17689abd681c
SHA256afb2239edccc7e89db3cfa10edae4ca8881819cceac0b4f867a2295c0f098efa
SHA512f83bdb4e5de50b8d89135f4afbe649a718e6c2076ecd09580d51f623dbc5501514d3197628033419a50a13d2b58400e06a74576685c94cbea1cb9aca239fdc80
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres
Filesize2KB
MD5edef23c7c61904c66ca9b17e2ac77f37
SHA1543ee30fc636087bf2203ceab54e0cad3e6e4810
SHA256312e1026ef7797aef12e991d5a4ed1306b7f9a4594d207a7426da2de0f5db007
SHA5124320248c363efb9b2718485efe4fa5304876f450ebee86af4d938c5601d63c820cd8f859c2712330d73796a01cc46e9471891d4604a4669a0980f74b4b2d347e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QKJHZK6M\microsoft.windows[1].xml
Filesize96B
MD5c80e07f2e2bce84e8f3380b42ba6bd94
SHA133e20b05fc67a22ac3f3c214a32057254f97f2e7
SHA25614808d37f1d44780098ddc2af07f7862b3c0c5ab1bfed6b267621e0a332a8bbd
SHA512f5adf8b7bbc1b450249034376f7df69eaf2a7be8e516d511bb82828c19efddbee9247d20e4b4c629b7fe58c9391c31fbf48bdb1b857ca13e5f52b80cb7883f24
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
117KB
MD5a52e5220efb60813b31a82d101a97dcb
SHA156e16e4df0944cb07e73a01301886644f062d79b
SHA256e7c8e7edd9112137895820e789baaaeca41626b01fb99fede82968ddb66d02cf
SHA512d6565ba18b5b9795d6bde3ef94d8f7cd77bf8bb69ba3fe7adefb80fc7c5d888cdfdc79238d86a0839846aea4a1e51fc0caed3d62f7054885e8b15fad9f6c654e
-
Filesize
450KB
MD52335ab0c0e19c0ef416d07df66fee649
SHA11e8794aff453f7647a6c149f3d38f7a3ff4ccd1b
SHA256f0e46c0f9b2991fa6d187c6b2bed28139c67804cc58cc45c77f06a6f217cb21a
SHA512518580d7a0d8f9610c8ec0204ae879a91a24325fb5e45348e6f0769aa25a69525992bc0f722df113993aa29a1a917de8fbecfb39d547d6f25354c3488bf06a62
-
Filesize
113B
MD554c1e9b18e2cc1251846646e0c4e6313
SHA1b80e6d2ca3dfee4cbb0702414476420386cfea4c
SHA2566cdc2912b78cdefc2118c3a9f606d5146512eb6cae8c79b2be3cb9fd440d2181
SHA5129d7e5c410932bb58021a5cb2db5ebb10180a21fb3d6985eeeefe03da2e2e608e3afd879a2c967f14609bb93a255a1256a5a12cb4f37c3bd8eedc9053be3fca92
-
Filesize
304B
MD56eadce1c4bce70533b6e2b1e7a900d49
SHA191d371e62f0e0f8aeed95972544a890098577287
SHA2569fa74d1001886c339cecee7359b25211c4b340a2ba397c430cdedafd36aaec24
SHA51274d68c0cf0e24feb02b7f017c64c37a480d2ac723b5af70e8ed19db01a6c2f381abf8669958f0c40a825e176cae5bbb6d417b5542b5a0f7b6c93fbb1dc6b2293