Overview
overview
10Static
static
10Nursultan Alpha.zip
windows10-ltsc 2021-x64
10Nursultan ...-0.dll
windows10-ltsc 2021-x64
1Nursultan ...-0.dll
windows10-ltsc 2021-x64
1Nursultan ...-0.dll
windows10-ltsc 2021-x64
1Nursultan ...-0.dll
windows10-ltsc 2021-x64
1Nursultan ...ch.dll
windows10-ltsc 2021-x64
1Nursultan ...wt.dll
windows10-ltsc 2021-x64
1Nursultan ...em.dll
windows10-ltsc 2021-x64
1Nursultan ...et.dll
windows10-ltsc 2021-x64
1Nursultan ...er.dll
windows10-ltsc 2021-x64
1Nursultan ...pe.dll
windows10-ltsc 2021-x64
1Nursultan ...nt.dll
windows10-ltsc 2021-x64
1Nursultan ...ss.dll
windows10-ltsc 2021-x64
1Nursultan ...sc.dll
windows10-ltsc 2021-x64
1Nursultan ...11.dll
windows10-ltsc 2021-x64
1Nursultan ...as.dll
windows10-ltsc 2021-x64
1Nursultan ...rt.exe
windows10-ltsc 2021-x64
10Nursultan ...ur.exe
windows10-ltsc 2021-x64
10Analysis
-
max time kernel
864s -
max time network
855s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
21-12-2024 12:51
Behavioral task
behavioral1
Sample
Nursultan Alpha.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Nursultan Alpha/api-ms-win-core-datetime-l1-1-0.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Nursultan Alpha/api-ms-win-core-debug-l1-1-0.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Nursultan Alpha/api-ms-win-core-errorhandling-l1-1-0.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Nursultan Alpha/api-ms-win-core-handle-l1-1-0.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
Nursultan Alpha/attach.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
Nursultan Alpha/awt.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
Nursultan Alpha/dt_shmem.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
Nursultan Alpha/dt_socket.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
Nursultan Alpha/fontmanager.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
Nursultan Alpha/freetype.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral12
Sample
Nursultan Alpha/instrument.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral13
Sample
Nursultan Alpha/j2gss.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
Nursultan Alpha/j2pcsc.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
Nursultan Alpha/j2pkcs11.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
Nursultan Alpha/jaas.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
Nursultan Alpha/start.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral18
Sample
Nursultan Alpha/workspace/nur.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Nursultan Alpha.zip
-
Size
3.2MB
-
MD5
19a8805e3588ee9e689672cff8e092b1
-
SHA1
28b393d298a7f6327608f9a4deed44321859eefa
-
SHA256
6769f3dcde3cc9f6fb8fd1fb6a37b52221ef79b97d5d4002c44308da7a24b144
-
SHA512
32a014f6af133487e509e362a156ec5046db58fd8e4eb7ef4b617ef512a1576da4d38bb06c820052a35fc875332f8089677d3c986302be72814d5a28950e972d
-
SSDEEP
98304:4XqvYTd4WG53jRdbFxwLH6CrP+cKTdN9vChii6TevAF:aqgTdCz74awO7Chi7NF
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\", \"C:\\Windows\\ja-JP\\Registry.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\", \"C:\\Windows\\ja-JP\\Registry.exe\", \"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\", \"C:\\Windows\\ja-JP\\Registry.exe\", \"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Mail\\TrustedInstaller.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\", \"C:\\Windows\\ja-JP\\Registry.exe\", \"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Mail\\TrustedInstaller.exe\", \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\1.3.147.37\\csrss.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\", \"C:\\Windows\\ja-JP\\Registry.exe\", \"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\", \"C:\\Program Files (x86)\\Windows Mail\\TrustedInstaller.exe\", \"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\1.3.147.37\\csrss.exe\", \"C:\\chainBlocksurrogatewin\\Comcontainerdriver.exe\"" Comcontainerdriver.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2908 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1752 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4416 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4392 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4996 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4716 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3016 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4180 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1948 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 232 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2016 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3232 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3808 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4512 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 2196 schtasks.exe 88 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4284 2196 schtasks.exe 88 -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 872 powershell.exe 4136 powershell.exe 4156 powershell.exe 2584 powershell.exe 4600 powershell.exe 1596 powershell.exe -
Checks computer location settings 2 TTPs 61 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Registry.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation TrustedInstaller.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation start.bat Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation Comcontainerdriver.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe Key value queried \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\Control Panel\International\Geo\Nation lsass.exe -
Executes dropped EXE 64 IoCs
pid Process 2152 start.bat 2672 start.bat 2136 start.bat 2356 start.bat 3040 start.bat 1620 start.bat 1828 Comcontainerdriver.exe 328 start.bat 3684 start.bat 3688 start.bat 4992 Registry.exe 4800 Comcontainerdriver.exe 400 Comcontainerdriver.exe 2860 Registry.exe 4792 Comcontainerdriver.exe 3468 Comcontainerdriver.exe 5068 Comcontainerdriver.exe 4900 Comcontainerdriver.exe 4704 Comcontainerdriver.exe 900 Comcontainerdriver.exe 1596 Comcontainerdriver.exe 2360 Comcontainerdriver.exe 4512 lsass.exe 2904 RuntimeBroker.exe 2460 lsass.exe 3236 lsass.exe 216 lsass.exe 1396 lsass.exe 2556 lsass.exe 1212 lsass.exe 3196 lsass.exe 4716 lsass.exe 1004 lsass.exe 1140 lsass.exe 1328 lsass.exe 912 TrustedInstaller.exe 3528 lsass.exe 2952 TrustedInstaller.exe 3468 lsass.exe 4432 lsass.exe 4880 lsass.exe 4956 lsass.exe 4816 lsass.exe 60 lsass.exe 4948 lsass.exe 1376 lsass.exe 3288 lsass.exe 3380 lsass.exe 2428 lsass.exe 2360 lsass.exe 1116 lsass.exe 2208 lsass.exe 2020 lsass.exe 3360 lsass.exe 2612 Comcontainerdriver.exe 1968 lsass.exe 3380 Comcontainerdriver.exe 4320 lsass.exe 4572 Comcontainerdriver.exe 4052 lsass.exe 2532 Comcontainerdriver.exe 2044 Comcontainerdriver.exe 4752 lsass.exe 5036 Comcontainerdriver.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Program Files\\Windows Photo Viewer\\en-US\\RuntimeBroker.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller = "\"C:\\Program Files (x86)\\Windows Mail\\TrustedInstaller.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\1.3.147.37\\csrss.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Comcontainerdriver = "\"C:\\chainBlocksurrogatewin\\Comcontainerdriver.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Windows\\ja-JP\\Registry.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry = "\"C:\\Windows\\ja-JP\\Registry.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TrustedInstaller = "\"C:\\Program Files (x86)\\Windows Mail\\TrustedInstaller.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Program Files (x86)\\Microsoft\\EdgeUpdate_bk\\1.3.147.37\\csrss.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Comcontainerdriver = "\"C:\\chainBlocksurrogatewin\\Comcontainerdriver.exe\"" Comcontainerdriver.exe Set value (str) \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Microsoft Office 15\\ClientX64\\lsass.exe\"" Comcontainerdriver.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 ipinfo.io 27 ipinfo.io -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSC4ECFE9812F12498AA3C916B15C72A3.TMP csc.exe File created \??\c:\Windows\System32\k851kw.exe csc.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe Comcontainerdriver.exe File created C:\Program Files\Windows Photo Viewer\en-US\9e8d7a4ca61bd9 Comcontainerdriver.exe File created C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe Comcontainerdriver.exe File created C:\Program Files\Microsoft Office 15\ClientX64\6203df4a6bafc7 Comcontainerdriver.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe Comcontainerdriver.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\886983d96e3d3e Comcontainerdriver.exe File created C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe Comcontainerdriver.exe File created C:\Program Files (x86)\Windows Mail\04c1e7795967e4 Comcontainerdriver.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ja-JP\Registry.exe Comcontainerdriver.exe File created C:\Windows\ja-JP\ee2ad38f3d4382 Comcontainerdriver.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.bat Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 25 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4500 PING.EXE 5076 PING.EXE 5080 PING.EXE 1528 PING.EXE 3360 PING.EXE 1340 PING.EXE 4556 PING.EXE 3832 PING.EXE 3036 PING.EXE 2108 PING.EXE 4432 PING.EXE 1516 PING.EXE 2648 PING.EXE 2360 PING.EXE 2788 PING.EXE 2832 PING.EXE 4872 PING.EXE 864 PING.EXE 5044 PING.EXE 2436 PING.EXE 4764 PING.EXE 2144 PING.EXE 1160 PING.EXE 2040 PING.EXE 448 PING.EXE -
Modifies registry class 52 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings start.bat Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Registry.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings lsass.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings TrustedInstaller.exe Key created \REGISTRY\USER\S-1-5-21-2366345620-3342093254-3461191856-1000_Classes\Local Settings Comcontainerdriver.exe -
Runs ping.exe 1 TTPs 25 IoCs
pid Process 448 PING.EXE 2436 PING.EXE 1516 PING.EXE 1160 PING.EXE 5080 PING.EXE 3360 PING.EXE 4556 PING.EXE 4500 PING.EXE 5076 PING.EXE 1528 PING.EXE 1340 PING.EXE 2788 PING.EXE 2040 PING.EXE 3832 PING.EXE 4432 PING.EXE 2108 PING.EXE 4872 PING.EXE 3036 PING.EXE 4764 PING.EXE 2144 PING.EXE 864 PING.EXE 2648 PING.EXE 2360 PING.EXE 5044 PING.EXE 2832 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4416 schtasks.exe 4392 schtasks.exe 4716 schtasks.exe 4512 schtasks.exe 2000 schtasks.exe 4284 schtasks.exe 1752 schtasks.exe 232 schtasks.exe 2016 schtasks.exe 1948 schtasks.exe 3232 schtasks.exe 3016 schtasks.exe 1664 schtasks.exe 4180 schtasks.exe 3808 schtasks.exe 928 schtasks.exe 2908 schtasks.exe 4996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe 1828 Comcontainerdriver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1088 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1088 7zFM.exe Token: 35 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeDebugPrivilege 1828 Comcontainerdriver.exe Token: SeSecurityPrivilege 1088 7zFM.exe Token: SeDebugPrivilege 4136 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 4156 powershell.exe Token: SeDebugPrivilege 2584 powershell.exe Token: SeIncreaseQuotaPrivilege 1596 powershell.exe Token: SeSecurityPrivilege 1596 powershell.exe Token: SeTakeOwnershipPrivilege 1596 powershell.exe Token: SeLoadDriverPrivilege 1596 powershell.exe Token: SeSystemProfilePrivilege 1596 powershell.exe Token: SeSystemtimePrivilege 1596 powershell.exe Token: SeProfSingleProcessPrivilege 1596 powershell.exe Token: SeIncBasePriorityPrivilege 1596 powershell.exe Token: SeCreatePagefilePrivilege 1596 powershell.exe Token: SeBackupPrivilege 1596 powershell.exe Token: SeRestorePrivilege 1596 powershell.exe Token: SeShutdownPrivilege 1596 powershell.exe Token: SeDebugPrivilege 1596 powershell.exe Token: SeSystemEnvironmentPrivilege 1596 powershell.exe Token: SeRemoteShutdownPrivilege 1596 powershell.exe Token: SeUndockPrivilege 1596 powershell.exe Token: SeManageVolumePrivilege 1596 powershell.exe Token: 33 1596 powershell.exe Token: 34 1596 powershell.exe Token: 35 1596 powershell.exe Token: 36 1596 powershell.exe Token: SeIncreaseQuotaPrivilege 4600 powershell.exe Token: SeSecurityPrivilege 4600 powershell.exe Token: SeTakeOwnershipPrivilege 4600 powershell.exe Token: SeLoadDriverPrivilege 4600 powershell.exe Token: SeSystemProfilePrivilege 4600 powershell.exe Token: SeSystemtimePrivilege 4600 powershell.exe Token: SeProfSingleProcessPrivilege 4600 powershell.exe Token: SeIncBasePriorityPrivilege 4600 powershell.exe Token: SeCreatePagefilePrivilege 4600 powershell.exe Token: SeBackupPrivilege 4600 powershell.exe Token: SeRestorePrivilege 4600 powershell.exe Token: SeShutdownPrivilege 4600 powershell.exe Token: SeDebugPrivilege 4600 powershell.exe Token: SeSystemEnvironmentPrivilege 4600 powershell.exe Token: SeRemoteShutdownPrivilege 4600 powershell.exe Token: SeUndockPrivilege 4600 powershell.exe Token: SeManageVolumePrivilege 4600 powershell.exe Token: 33 4600 powershell.exe Token: 34 4600 powershell.exe Token: 35 4600 powershell.exe Token: 36 4600 powershell.exe Token: SeIncreaseQuotaPrivilege 4136 powershell.exe Token: SeSecurityPrivilege 4136 powershell.exe Token: SeTakeOwnershipPrivilege 4136 powershell.exe Token: SeLoadDriverPrivilege 4136 powershell.exe Token: SeSystemProfilePrivilege 4136 powershell.exe Token: SeSystemtimePrivilege 4136 powershell.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe 1088 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2152 1088 7zFM.exe 82 PID 1088 wrote to memory of 2152 1088 7zFM.exe 82 PID 1088 wrote to memory of 2152 1088 7zFM.exe 82 PID 2152 wrote to memory of 3180 2152 start.bat 87 PID 2152 wrote to memory of 3180 2152 start.bat 87 PID 2152 wrote to memory of 3180 2152 start.bat 87 PID 1088 wrote to memory of 2672 1088 7zFM.exe 92 PID 1088 wrote to memory of 2672 1088 7zFM.exe 92 PID 1088 wrote to memory of 2672 1088 7zFM.exe 92 PID 2672 wrote to memory of 1844 2672 start.bat 93 PID 2672 wrote to memory of 1844 2672 start.bat 93 PID 2672 wrote to memory of 1844 2672 start.bat 93 PID 1088 wrote to memory of 2136 1088 7zFM.exe 94 PID 1088 wrote to memory of 2136 1088 7zFM.exe 94 PID 1088 wrote to memory of 2136 1088 7zFM.exe 94 PID 1088 wrote to memory of 2356 1088 7zFM.exe 95 PID 1088 wrote to memory of 2356 1088 7zFM.exe 95 PID 1088 wrote to memory of 2356 1088 7zFM.exe 95 PID 2136 wrote to memory of 3828 2136 start.bat 96 PID 2136 wrote to memory of 3828 2136 start.bat 96 PID 2136 wrote to memory of 3828 2136 start.bat 96 PID 2356 wrote to memory of 5016 2356 start.bat 98 PID 2356 wrote to memory of 5016 2356 start.bat 98 PID 2356 wrote to memory of 5016 2356 start.bat 98 PID 1088 wrote to memory of 3040 1088 7zFM.exe 97 PID 1088 wrote to memory of 3040 1088 7zFM.exe 97 PID 1088 wrote to memory of 3040 1088 7zFM.exe 97 PID 3040 wrote to memory of 1836 3040 start.bat 99 PID 3040 wrote to memory of 1836 3040 start.bat 99 PID 3040 wrote to memory of 1836 3040 start.bat 99 PID 1088 wrote to memory of 1620 1088 7zFM.exe 100 PID 1088 wrote to memory of 1620 1088 7zFM.exe 100 PID 1088 wrote to memory of 1620 1088 7zFM.exe 100 PID 1620 wrote to memory of 1416 1620 start.bat 101 PID 1620 wrote to memory of 1416 1620 start.bat 101 PID 1620 wrote to memory of 1416 1620 start.bat 101 PID 3180 wrote to memory of 4500 3180 WScript.exe 102 PID 3180 wrote to memory of 4500 3180 WScript.exe 102 PID 3180 wrote to memory of 4500 3180 WScript.exe 102 PID 4500 wrote to memory of 1828 4500 cmd.exe 104 PID 4500 wrote to memory of 1828 4500 cmd.exe 104 PID 1828 wrote to memory of 2772 1828 Comcontainerdriver.exe 108 PID 1828 wrote to memory of 2772 1828 Comcontainerdriver.exe 108 PID 2772 wrote to memory of 4704 2772 csc.exe 110 PID 2772 wrote to memory of 4704 2772 csc.exe 110 PID 1828 wrote to memory of 872 1828 Comcontainerdriver.exe 126 PID 1828 wrote to memory of 872 1828 Comcontainerdriver.exe 126 PID 1828 wrote to memory of 4136 1828 Comcontainerdriver.exe 127 PID 1828 wrote to memory of 4136 1828 Comcontainerdriver.exe 127 PID 1828 wrote to memory of 1596 1828 Comcontainerdriver.exe 128 PID 1828 wrote to memory of 1596 1828 Comcontainerdriver.exe 128 PID 1828 wrote to memory of 4600 1828 Comcontainerdriver.exe 129 PID 1828 wrote to memory of 4600 1828 Comcontainerdriver.exe 129 PID 1828 wrote to memory of 2584 1828 Comcontainerdriver.exe 131 PID 1828 wrote to memory of 2584 1828 Comcontainerdriver.exe 131 PID 1828 wrote to memory of 4156 1828 Comcontainerdriver.exe 132 PID 1828 wrote to memory of 4156 1828 Comcontainerdriver.exe 132 PID 1088 wrote to memory of 328 1088 7zFM.exe 138 PID 1088 wrote to memory of 328 1088 7zFM.exe 138 PID 1088 wrote to memory of 328 1088 7zFM.exe 138 PID 1828 wrote to memory of 1296 1828 Comcontainerdriver.exe 139 PID 1828 wrote to memory of 1296 1828 Comcontainerdriver.exe 139 PID 1296 wrote to memory of 232 1296 cmd.exe 141 PID 1296 wrote to memory of 232 1296 cmd.exe 141 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Nursultan Alpha.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\7zO044725F7\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO044725F7\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5vi5jcxk\5vi5jcxk.cmdline"6⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5F22.tmp" "c:\Windows\System32\CSC4ECFE9812F12498AA3C916B15C72A3.TMP"7⤵PID:4704
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\ja-JP\Registry.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\chainBlocksurrogatewin\Comcontainerdriver.exe'6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CMOOBihidq.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:232
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:3680
-
-
C:\Windows\ja-JP\Registry.exe"C:\Windows\ja-JP\Registry.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hR2MTpBDVc.bat"8⤵PID:1848
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:2600
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:2000
-
-
C:\Windows\ja-JP\Registry.exe"C:\Windows\ja-JP\Registry.exe"9⤵
- Executes dropped EXE
PID:2860
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO04467638\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO04467638\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GCUhdmH1So.bat"6⤵PID:4284
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:4108
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:448
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"7⤵
- Executes dropped EXE
PID:4900
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO044CC508\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO044CC508\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4508 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:400 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dV69F4sOEJ.bat"6⤵PID:2792
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:2928
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:4944
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"7⤵
- Executes dropped EXE
PID:4704
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO04402708\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO04402708\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:4792
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0440B208\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO0440B208\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4568 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:3468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO044DCF68\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO044DCF68\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4008 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:5068
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO04478A48\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO04478A48\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:328 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO044E9B58\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO044E9B58\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3684 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:1428 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:1596
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0443A558\start.bat"C:\Users\Admin\AppData\Local\Temp\7zO0443A558\start.bat"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3688 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\chainBlocksurrogatewin\GQQ4ylq7g8v2sObSsphEhdaxNJcwRuTMFt5I2eiVZyEpGNyUkwbTE.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\chainBlocksurrogatewin\jadNZOaHlMDhsSca68lTCEwCwvIEx4Rlg.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:4528 -
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin/Comcontainerdriver.exe"5⤵
- Executes dropped EXE
PID:2360
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 11 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:928
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1752
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Windows\ja-JP\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4416
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Windows\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4392
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Windows\ja-JP\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4996
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1664
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4180
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1948
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2016
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3808
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComcontainerdriverC" /sc MINUTE /mo 8 /tr "'C:\chainBlocksurrogatewin\Comcontainerdriver.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4512
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Comcontainerdriver" /sc ONLOGON /tr "'C:\chainBlocksurrogatewin\Comcontainerdriver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComcontainerdriverC" /sc MINUTE /mo 12 /tr "'C:\chainBlocksurrogatewin\Comcontainerdriver.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4284
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4512 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylDQV2JGYe.bat"2⤵PID:3448
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:4344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3832
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2460 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FVJApcqkHv.bat"4⤵PID:3056
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:3032
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4764
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3236 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0EsgTYIxwU.bat"6⤵PID:2680
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3356
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:220
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e6v3dq4CIc.bat"8⤵PID:2280
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:2972
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2144
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1396 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s2nU7uS06N.bat"10⤵PID:348
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4608
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:4672
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\285J1A1WUD.bat"12⤵PID:1340
-
C:\Windows\system32\chcp.comchcp 6500113⤵PID:3868
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵PID:2780
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1212 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylDQV2JGYe.bat"14⤵PID:1828
-
C:\Windows\system32\chcp.comchcp 6500115⤵PID:2252
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4500
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e6v3dq4CIc.bat"16⤵PID:5116
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:3924
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5076
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4716 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ds6v954M6h.bat"18⤵PID:4384
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:2080
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵PID:3212
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1004 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nQ6S61kszs.bat"20⤵PID:4480
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:1164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:864
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1140 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AntDRUzUoe.bat"22⤵PID:3412
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4504
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2436
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1328 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PUr4LdF8J0.bat"24⤵PID:4732
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:1848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1516
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3528 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n5TyArTaLh.bat"26⤵PID:3632
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1160
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3468 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\e6v3dq4CIc.bat"28⤵PID:1532
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:3696
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2648
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4432 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\9Y35xjzddj.bat"30⤵PID:5116
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:4660
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:231⤵PID:4216
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KSdgmfp92b.bat"32⤵PID:3516
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:4800
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2360
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4956 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\YvmOC36wL2.bat"34⤵PID:1976
-
C:\Windows\system32\chcp.comchcp 6500135⤵PID:4892
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost35⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5080
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4816 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IeLvrzYA0a.bat"36⤵PID:332
-
C:\Windows\system32\chcp.comchcp 6500137⤵PID:4624
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost37⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5044
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:60 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QjhCqOFzVv.bat"38⤵PID:3336
-
C:\Windows\system32\chcp.comchcp 6500139⤵PID:2488
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost39⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1528
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\n5TyArTaLh.bat"40⤵PID:1876
-
C:\Windows\system32\chcp.comchcp 6500141⤵PID:2652
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost41⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3360
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1376 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ylDQV2JGYe.bat"42⤵PID:2612
-
C:\Windows\system32\chcp.comchcp 6500143⤵PID:3048
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost43⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1340
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3288 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MMpJJGXiaL.bat"44⤵PID:1216
-
C:\Windows\system32\chcp.comchcp 6500145⤵PID:1828
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost45⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4556
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FVJApcqkHv.bat"46⤵PID:2592
-
C:\Windows\system32\chcp.comchcp 6500147⤵PID:4344
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost47⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4432
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2428 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qZ8E8OSIiX.bat"48⤵PID:3008
-
C:\Windows\system32\chcp.comchcp 6500149⤵PID:868
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:249⤵PID:808
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2360 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CnplMLrBiA.bat"50⤵PID:1804
-
C:\Windows\system32\chcp.comchcp 6500151⤵PID:4728
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:251⤵PID:4892
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1116 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FVJApcqkHv.bat"52⤵PID:2764
-
C:\Windows\system32\chcp.comchcp 6500153⤵PID:4640
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost53⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2788
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2208 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\IzyQn8pRfl.bat"54⤵PID:2544
-
C:\Windows\system32\chcp.comchcp 6500155⤵PID:4940
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:255⤵PID:2572
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2020 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RI9pGJW8L1.bat"56⤵PID:1620
-
C:\Windows\system32\chcp.comchcp 6500157⤵PID:4752
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:257⤵PID:3648
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3360 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\EHU1Lrqt50.bat"58⤵PID:3268
-
C:\Windows\system32\chcp.comchcp 6500159⤵PID:3884
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost59⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2832
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1968 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RyWKKAFqhq.bat"60⤵PID:2732
-
C:\Windows\system32\chcp.comchcp 6500161⤵PID:2648
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:261⤵PID:4024
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MMpJJGXiaL.bat"62⤵PID:1176
-
C:\Windows\system32\chcp.comchcp 6500163⤵PID:4384
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost63⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2108
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4052 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PpUZInWQxB.bat"64⤵PID:3728
-
C:\Windows\system32\chcp.comchcp 6500165⤵PID:332
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost65⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4872
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"65⤵
- Executes dropped EXE
PID:4752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe"C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe"1⤵
- Executes dropped EXE
PID:2904
-
C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe"C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vIYAWWKYBo.bat"2⤵PID:3660
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2060
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:1568
-
-
C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe"C:\Program Files (x86)\Windows Mail\TrustedInstaller.exe"3⤵
- Executes dropped EXE
PID:2952
-
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2612 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\AntDRUzUoe.bat"2⤵PID:644
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:2992
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3036
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3380 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2etq6r2t5.bat"4⤵PID:3016
-
C:\Windows\system32\chcp.comchcp 650015⤵PID:4072
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵PID:2568
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4572 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FVJApcqkHv.bat"6⤵PID:4232
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:3364
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2040
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2532 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rnyMd9S9uS.bat"8⤵PID:3208
-
C:\Windows\system32\chcp.comchcp 650019⤵PID:1784
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵PID:3880
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\2hXwS5IfKK.bat"10⤵PID:3636
-
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4776
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵PID:3660
-
-
C:\chainBlocksurrogatewin\Comcontainerdriver.exe"C:\chainBlocksurrogatewin\Comcontainerdriver.exe"11⤵
- Executes dropped EXE
PID:5036
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"1⤵
- Checks computer location settings
- Modifies registry class
PID:5060 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2etq6r2t5.bat"2⤵PID:4920
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:752
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵PID:2520
-
-
C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"C:\Program Files\Microsoft Office 15\ClientX64\lsass.exe"3⤵PID:3736
-
-
-
C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe"C:\Program Files\Windows Photo Viewer\en-US\RuntimeBroker.exe"1⤵PID:3112
-
C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.147.37\csrss.exe"1⤵PID:2584
-
C:\Windows\ja-JP\Registry.exe"C:\Windows\ja-JP\Registry.exe"1⤵PID:928
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD510f15aa80aa2712d592786f15b50c834
SHA18d25495feb78e99f2a43a0213b8e893a89322d61
SHA2562376f19e260612a53a84221875a19709f2852332b5b12c0b4bb305784129fb19
SHA512b3204e3a8ceef19e5b4496bb951077f367e6fb87ca9048e184de55570425211739a258854cff1150a43145c476d715ad8bfdcd7553e758bd23f0389bbb015e43
-
Filesize
2KB
MD537b7d8a80014e411590a12eabd434e3f
SHA1a5b974633e16e2d026cb0d4ac44bcceedc89a6c4
SHA2562ed89fa4863a8e41972a29a6b55734278470e9fcf2ae95b3b0d6c66342c977a9
SHA5128c0e3f3ceeb9e36a48c0f920d25eec09d902e19a11ca775678de9fb96e0bb678a7b0e2a5daf5569a33bb4cf80b18d77815079c4bc0517c8ab594ee7b471580ea
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
1KB
MD5af1cc13f412ef37a00e668df293b1584
SHA18973b3e622f187fcf484a0eb9fa692bf3e2103cb
SHA256449c0c61734cf23f28ad05a7e528f55dd8a7c6ae7a723253707e5f73de187037
SHA51275d954ec8b98f804d068635875fac06e9594874f0f5d6e2ad9d6267285d1d4a1de6309009de9e2956c6477a888db648396f77a1a49b58287d2683b8214e7a3d3
-
Filesize
1KB
MD590d696d6a8ab185c1546b111fa208281
SHA1b0ce1efde1dad3d65f7a78d1f6467d8a1090d659
SHA25678497ed2c4ccac6e870afc80224724f45a7356bde55580a5c6ea52ef5079a3f4
SHA5120a19628ae31ec31f382b3fd430c205a39985730e12c608b66b83ee4826e3f3fc9f4a034e03f38ac5260defdf805b927528ffca1a2ccdd59d9bfe05822923c4ba
-
Filesize
232B
MD54555e9d766355a44d7a9dff26c845d78
SHA1816a98e33e46dff37e17dac19ea681513ce3b1d3
SHA2562ff6b4753a3a0bac8e0e1b4bc9dd5ce02a7b4b3cd60be87ce7f3d8a38e3e71bd
SHA51279454d000a3e4c3fcd8b37c86ab593a441a03e394aae1726152746ff4f6fff27ff62e90c672df3034fee5b6cd052383ea0a93c7ed4ca3b901cbed3299fda4425
-
Filesize
232B
MD57658e1732be49c355422e3d70232bc05
SHA1fa60e9831adfb7cbc3ebe5d2d0963911f1f9e02f
SHA25686683581cf4bf18459a91556ae6e3fe8024b94ee0615c9a237707c94837f79d5
SHA51217e6898aa457a1f28b89b1c1b9db7fb582318f7ffd7c2afcd8503ebacc1720f1e666eeb1d9a53ec8479bd63d3775612130f63ff0159cf2d31e281aa7ce48c080
-
Filesize
224B
MD5c44a589c910625c10d4c642059e44bac
SHA1f1bf172d578def26546c0d7ae10c12861f2c4111
SHA2568cbd865a4d65b4da8d7f4545c76614f04e50a846ba72658391f03a4fe8d3a6d4
SHA5124df5f74e0e81f89b6b042ddeeb4b48f53729339f7d3e8064b12404457e335aa90eabfed8cb29265504c916577fa2ceafd3340129a8596b5abde8bfaa56dc5de2
-
Filesize
2.3MB
MD5c473326baa0562bc1081ac3fff5fadab
SHA179ae481230a4aeb89232b60bb015c7f376cd70d7
SHA25666058290e904b349c68a65b6deac3875acf5c9b618bd31756f1a9cbde2cfb83b
SHA512f822532e90006b0e69305a93e01512185a1a367ebb734e8b8c443efb716abe1d4460f246b70b32e7e18c8fc6aa7db85ec039d59773305e8061375b0634351ff5
-
Filesize
232B
MD5e514898e211e33c9088e992ea6a5e642
SHA17df4a373751ba53b3b91df4cb968220dfc0a7581
SHA256f088e4ee3f46d750b32cfc776e56e08ca6b21b186a0befdeae8ff1fbfca425db
SHA51226ae459f92a15f3ffeaff644214cf93321aaa52938ad881971099f0bed07c1b10bc4bb8e48eb6f4a5e3594d521c52f181b173bfe33dd98e31291c821d606525c
-
Filesize
176B
MD56517fb4accffb215922e25c32009c474
SHA1d09e322cdab8c873dadc69ca541749850c2ba8df
SHA2562252e0144fea8f09352b9d26809302cbc1838b8a894db5180e22065d5659a33b
SHA512c0b74cb67896348d3241e8497f4a2b04492715b5211fd77ff2220908c28af93c2afe647ec5eddf36991457f0e947f1b2bdeb6b93cf3feffd3c4ddae5a9a2c802
-
Filesize
184B
MD5993cec0c11061b7d4244361f04024f40
SHA16d19f1ed68d33adba7d64983147fef6c4db37777
SHA256fbb0e68aa72f3e1bf2d57bf47c7189d0143b6af73d8c9cd87388fc30e8f003c9
SHA512d35cd98a97301514bea0dba90af8e3a9b950d66ca2b386d2c65650d22b1cdc278f3ddc55fe5c784fd1e3acb4f6e19bfd97cb5a737c53b32ad609a7b85dcc12eb
-
Filesize
205B
MD5eebc7f84fcc281095b616d6d7e8d1ca1
SHA1497a76ff8b0e6a5629cf6d566b12eec96699ff6a
SHA2561ec1afc39a5e5ce1f8bb3dc4cc1a1d922f044a20491147bbc712f7e65f1444bf
SHA5127e03443c797331aabb6f31ddb681d418e23d7ed4491ef6ad8b449be2c25fefd2aa9cf212319c2de6debfdb6edcc5b5b2e3a1a4179148b08bdb8b91f86492e505
-
Filesize
232B
MD50a6e42ff56d1e1361ef2259f9c51785c
SHA12e479e0f0481a9799bcc2e2e094455807a995df2
SHA256f2cea758cfdd8f731ab5e8bcd81ad12550ba95870a7c2d0ee5582633838107a6
SHA512d7d4719a13d6573c7131b9c81264389ea6c10e22806b8b1eab0e78d0a7ac8e27e1bd8b0d36a2925f350ab61a599e08a496e794aa096a3f3679c0972a097950a7
-
Filesize
224B
MD5f97ddb8a2c6b2bf16e9fcc9b0cb97137
SHA1b8f3c3fdb2ac74b893ca5e1bd7c9f13380f6ea6d
SHA2560a31b9b341bdc0c0097e99a9012b912beb3438e7fc9693c9646d99bc758a4434
SHA5123a2dc2d58b00b7a66037cfafca4b40b65c465f42113fba9196bb4f2da7f3dfc9ce0cba95f637ba7909a5331567b0e3f39ad9b7adaf5cc52eca34e27c87cc223f
-
Filesize
232B
MD5f62ecea200298e755401fe92948f8f82
SHA110e835dc984042a41fe3760a19d5f5cb0aefaafb
SHA256d0a5dd6a46879a6224878d40ab598c308ce04a897c44faa216ddf7d2124514e8
SHA512ae93b2a6b07ae9a93a0924fd751fec816d37f66592b03af68bf16391be971deb82197665bf71a6ff9cc5eece0d9e28148c5c29b6f35cfccc56ef4e28b4b26a41
-
Filesize
184B
MD5a9629c81ac0b7555e75cbc936a576875
SHA1a5f97af441cf259802e0f7bfed159149e20dbc7a
SHA2568a68d5b4975de84873c926aa44477e01bad39f7918d06fd2064ec56b161def0a
SHA51279b0dedfe52047c1269549b26ca36261a804c81331d5246208faefd3993f5b68e87eec376cc4f5dd99063c164b0055b8f4d7dd107919a70b67a47853ba1172d4
-
Filesize
184B
MD5b2f2ddca656870ce686a74afba07eb61
SHA187f071a2639206e9fd6e71273a0891607a335c6a
SHA2566889c91fbb2bac04ec62fe22b92c963c4f7664c4e743277afc2488971eed74dc
SHA5122c0fa09e498f088209e9514028aed540298106656a871aa647445576aacc1d89a4269b088e49e35fcafb552155ffbe6129ecec1b5c3cc141b93194f1d0291b3a
-
Filesize
176B
MD570c4d1989604d5d8157898eda9729f68
SHA1a4345d802026e13b8e236176352fdb1b1e0b6b3f
SHA256c07fb0beb3d61256b9232381dcf89ebdcb7cf9da3deb42e994a9af031d08fb73
SHA512529fc8a9a1d11b7ad4721933b2aadbdae4bb98b2444be86d0ed08ebdc9c17ca17a40119b045fda58e0be1239035a8034c0f52640ade2ccec9580633778df3d65
-
Filesize
176B
MD57686854bed0490abd124edfb22384de6
SHA1bf992bc49c1b702129d63323d2e28eda911cc744
SHA256c7615dcd652f0993f6edfd42d77f1881de107a08a7bff984e5cd05397e17bf76
SHA512e8cfc5b25aee2336cb53615cd230b69e9e87f2a76998544628caa279f7e0a03b20de45b8d7ed1e3697f5a3516f837554983cfa7718e837b008007f1012a9c272
-
Filesize
184B
MD5c81ac846e0dc6d2e8a96737f4dcf9c4d
SHA1b216728c5e350e5d28ce95ef088fe4d2111e9bb4
SHA256b651d16c4252817cbc51c3bcc12641a871fb0d7688d475c597bf3a0ba14b770a
SHA512a583f68eca6a4231adb3e2283b3257ea909161fbae4f50b3706c6db5018e57ce597f649fb774c9868ce1c4c3f7f73fa7c1626524cf5b4770af3089d39bf78f2a
-
Filesize
232B
MD54df05e3e7f93943dccdd3da954193321
SHA1e3dd7073a43981cb8a4305e22239ec4656c81c0c
SHA2569c124d15b996a1cbe28ffbdf82904c811482ec1d26a380be246c2ff98fd86e84
SHA512a1e1840f21443bb328ca8565e6708b8082d827252f021911f492a2e39799d531d2c51c0e263f8f51047eb68efd2544cb651916927bc1aab04f6d9675879b593c
-
Filesize
184B
MD5ab46a6c8f73abcb710890ff72588afe6
SHA1b9522c2bdbbee2b9c6944ef5444b7b6646ee7d4b
SHA256265b2e6c3dcb88f5e53a18f5609cb108d9662a73c5e380e138cfcdb3b866098f
SHA512c350acb7161d946cda59b8dffdbf12188cd10617c2947d233adafbd8158d9ffae9f20f3f4183dd049c2628a02f0bdc62be220380f27d97984ecf7ccadd490565
-
Filesize
184B
MD5da499b923732b993521e7af0a2d8a34d
SHA1dfe71471fb2536cf1288eb625bd70fb38e5463d5
SHA2560cb8957348a2236912707b8fca9e6253c134f911668abe6fd4e283d5e0b6b4e4
SHA512f1a74a854f6a2470435a564890d456a44719b02fe8056c6f29fce8bec9c97da827faecb6fd0a399966bb569ccbe1be72c1f3c9e1f164249fe1e5e1fb2060e764
-
Filesize
184B
MD510e3bcf9da13439b153e429889fbab5e
SHA1e0b4bbe76e9f73ab1361a5bbb48ed528ebd0d494
SHA256bcf15832571d1616a4f45df6ac6d380cdd335b9d3aacdd8b01a4c46b0f43f290
SHA51261f8350b3bdbbc444d10344eee2d0b996ca7466973c5cf8ee4e12501440168bf6d70e7cdd82890cabbbe38b7d9faf0f844d38b3943b2a0c9b7a87dd46666e772
-
Filesize
184B
MD540164fdd6eba92aad92ac43d617dbbb7
SHA183abecfc23d92b2945ad6c85c2cee7a1f966beb3
SHA256cbad2be3c6fec22d46a3deded00da2650793bad59a7fb430b303c3bdd8096978
SHA5123754fad6099ff56432480756cdc35ba33025f0bb9eb4cdece1780c9fb4cbf926ee85ff8b55e72b00b071d934f8635ec97af8a16fb43a575bf56701ed51ee67a4
-
Filesize
184B
MD5a82e78754750bf59ec6d8f0f4c3caf5f
SHA1d6c8d2bc00def77bee127893e511fada47d4ebd8
SHA256c3bc0ea7c7a00b9de48808cc6bf5e5b5b8edadf42a71aadbd7b0b3296639a0d3
SHA512e6bfc9693c905e793e29a65abcc8ecad60e33140bac16842efded071dc1e40f71b978dbca8bb2b6a4ce432e0ed9ec5c87688848f9ca0f981f82a995d4f57aefa
-
Filesize
1KB
MD54c1aa8689c31f61f97588b0eec2446de
SHA15e5dde2495ef03f089eab06fdd5e028950a6c270
SHA256eef2c20e2ca221620f9a9639a6c074da9fe7d0bfa881d195f6d60a875e09381c
SHA512101cb473773b8e4a77bd9605a28a11ad14d882363117512f713f834b2ae2a94bedc69b7b493e8c2cf4eb1d0ea2d7682fb740cf4ecdcafd2d842963bcd2000b69
-
Filesize
232B
MD5433dc398eeeb532aa4c9f0ca2525b6be
SHA180ff34d49f99542a8f15ff51e620b58734fa2bbe
SHA2569a7dc99a6409c63b960310ebb3fa65a6e8760120b7d82c595a42655b2934b896
SHA512df7499bddcb41f6f973d617910f7a9b8db979d925bebc4ef9db69ea7814703d6e58317e8fe3cacac7c8dd0f4b02524491d96fec9de400850e6469015d0123cf9
-
Filesize
232B
MD597e8b46f7268e83f64c4b3ecbc5c572c
SHA1ab47a06ac81d6abae3aa0d94ead8734f83881760
SHA256eed9a1f3def6283a5b068ed02ce5359ede8fc339c6ed86b0761faff6407c726c
SHA5124af4fcafffae496b96ec2804143839253958ff09192da2b932cc7ee34147290f8c84da22747946b64697bf20e23d128f70a4f77d4c13b1944c79d25cc6105c84
-
Filesize
184B
MD508f667ea0041c93238dd274710bc5f97
SHA12c91ef4643d8cf6eec2de408a78c24bf987f97ca
SHA256c82bebb3606561a54024176a22908560c3a40a509078960a97aba285c3b381ab
SHA51210abbb091340d6eadb56159e68974829042bbca0ef667f740a9b85d72417d3ab1ff89ba781d739a9a896ca87f64998f15a70f0b6bd8cbb579383f042acfc9461
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
224B
MD5b5875a0eda9b26ddf7097d118fe02ada
SHA1d17214f1a13b8c0861034d575dda742b9f34ecdd
SHA256e40134ceccfd3408112ad37b78b39dec03c8a80051723c795e85c2b08c7b081e
SHA512e09c7fc5e74072afc4895085ed5508b5dd4528cb1a9fa00779865fbafdb4270238b522156ae705c88ba5d20aaa3f06a11688168cc24faf45610cce1b07e3e5ce
-
Filesize
232B
MD5266434ce8bb18a33616ffdfb4ce354bf
SHA150c76ec481835174cf75622f6e270b97d4f2143a
SHA256f0e7d522f61af5d331ead738f1be2a70b95be0175b60edfd003ee0241b1190e2
SHA512b9e689815aac62ed973933aed3f5f8ad28b2d215ed01db231005c3610cf4e58844e11eef126f3cf2341737d74e900527c77fd0516a11a0a1be6750269d24a558
-
Filesize
184B
MD566e8ff86d0bf5fd370e46dc21b918abd
SHA13bfdc5b7b755485b96209841c5fbf3f257c2ba80
SHA25687728a6e97a8861ccaaa029abc65b5de4a39b233003a6d3196e5ceadf7b23176
SHA512ca5f04ce9df79a47a53878f863b148f1e4f778334d7fdc8f49d09af747a333d55290ed0871818d33ee3b7d6bac2f61de4f248cc9dd56261f58a77d371b9777d1
-
Filesize
205B
MD5a8ac7cfd72ee23dd8c81afafd5ff113a
SHA19232f453ee191f2882a924dc4e40291efb610b11
SHA256a02c28355a4e20a7d4b23a5924a8b8f4f7ab52a79d3e553bdc370d8364808de5
SHA512c7bbab008a0928c7b8ec81370ffc27c57cc72e0868aa168cf013b9b982deae3cd53dafaa5e3c2223e218be4c9fc7f3407bbbd272c380ab49b625262828dafe82
-
Filesize
184B
MD5a50944c78ac4dd7ed86cb964129777d4
SHA1d9f7957fece38fad3f27288ca85a88b827f8b009
SHA2566beefe6d9d0ab0701de69ca31018b83adcc975fd665002f9648a6cca88ea0b36
SHA512b77d3b9155f5154fc2f37d8961a574ccaa270e7a08f43bc1edb6211d6b46ab54f1e484b2033e08edcd04b00efea04cb1449f65e9b955e6922de038f4de27c1cd
-
Filesize
184B
MD59e4f70c778570362bceafefdfe5a25f2
SHA112199394394c397d1c6523840af8c1d6982c1fd2
SHA256b9b87356d13d9944fab4deb2c0b636b43e642a4204c49a190a92079c50ae34de
SHA5121e0f7658a9ca03a8efca3f8ee048d1081c7fd8b2f70181ef8e4bf927f0a7eb4ab2bd0c10675f38893fe11f475060af08d2d9fa13e6a2cd31c5b195f84c3b1649
-
Filesize
232B
MD57e66a451c71f947f60fe2393509484f3
SHA100e7d39616e43311156bc5f5ba6af7fcf8fe4027
SHA25686868eebd6e969bf38bc5ecf89b2379a07261dc87f2406640b7f8adabd124dac
SHA512f33fa08a1e5de595dce31233a7c04b165680da1a0ce012c077bae253061536f093ad937f0e037c6c249e5396f0e300bf99ad74369a90f594743d06089532e842
-
Filesize
224B
MD5dde67fc612e463d703c4ed1e6ecc2273
SHA1f4cff11f183764dba06ed9ceaf5ee404c521c8a3
SHA25626b7963bd860f07f33f31364fae3fa2f5f588dc9fa748db526308ea86d3dcd31
SHA5122074a3c0c6d8fec3c13131a03f112a7a20677fa8e92ad7b41b487e79ce353e73ba17fc1efef32d5005b3a018ceb592b80a66669f18fb9677c3013fc7e97322a1
-
Filesize
232B
MD5b2a6663f9aa8ac6349db107221a75ea5
SHA1670e6c0b28ad14478f1168ce976196b2ee22d140
SHA256ae8aa411abc3ebd7cd4625d6fb3d4b2b72b848583fa5d9d152f628bbea07eed3
SHA512babb69ea1fff19ed0022e3674709a49f049e9de28db4eaa4a7e21c5a4b36039354f2f5d446ed9e24b28f155dd8bb4ec5d83441809a7e8b8138fb660a9011bd9b
-
Filesize
232B
MD558976fa89d3cf976b916a8c6a310e006
SHA113efb0b799c1b3a8a2f0406163fe40c5fb208ecc
SHA25668e08a6852513591336cbc65708dc24ac0a6ed58946457b83d410a88ee62bdff
SHA5124203afc2920b77a4b9f4e5ce3eaa759f6fe76405b75ad7a03367c9705b49899c655a86fe2caa3beb22eee7f7c54f27be4945352f07986b2bc94652b8153de62a
-
Filesize
184B
MD58ce698a532e3f7a83383caf636aebcd1
SHA18031effeb96f3f953ac97e780785576725737f27
SHA2562d4dbdabd9a5941dc315874d1c8910e71c25c260fd77a8488caea783981949ca
SHA51259f9a394464614b8c62f66b256d87c682e72b8054a9daf9a8bd50f7dee27127ba248718a52875e0e0a5a879499fbfdc9a5e9a3b995a9350480a2c8ba1a0531ac
-
Filesize
2.0MB
MD59d27ce3f27809787e6c8bf545963d1e0
SHA189c73f5ba0a7cfb3afa53515b38704f90f8e70c4
SHA256605f67d7b44d7d35fc5331e1badbe43ef332e369c86437c28bda68184c83294a
SHA5120b49b02802a1652487d7d9dc052444194e74a43a3771dc68081c545114a437fbcc2aedd8ca032144ae7fa3e480cc4727e01fa9d0aa461ea786cb9bf63f867a4d
-
Filesize
234B
MD58dfd0c504793456574496822db2d2a6d
SHA118f7f8d6e3af7dd7c2d491c219743ac6e18886d9
SHA256c9349402fa75d4a2ce0c9b704be94ca546cf3d2912a3272af80c050e8251c2b5
SHA512946de0213c05a3db186f27754b40e08de12021a7dc2cf43f55c29da4ec2bb40347abab7104684acf5696cb1e289ccb90ac826db5048dca698f98cb043d15358a
-
Filesize
104B
MD5e5d7112ec4ea1326fb903ec7d5249948
SHA1068099c095e83c6fa948702e467de51455f5b873
SHA2564a7538c31c88df87c83d85e6e729fe85ea5371ebf41545df1639dbf6a07ad709
SHA512ee5fe8ff4f8a41acad3baeb3069b662f808a6ccaf581c66340498ecdd6470af999c8d4fc91979269b51461bb025041d7cb2ac30c52603161aa0b11a53c889ba4
-
Filesize
388B
MD5743010d046595469a58cb72257980bf4
SHA1004b17a9e7d1ed5bd3cfe1083facca7a2cc2a64e
SHA25671597064c6e52e52cec035ff3abab4ec91b8ee76ba96030358e443e35f3300f6
SHA512b84a1ca353251def8496b587b199ff54ddc4428298b53d470886b7c3d849d76a693fb3f2e44350afe5aff87f876bb73baf9e81430a1cd803f575ae7e6579c5bf
-
Filesize
235B
MD5183297b99dd20d5f073b5a9087bd77a3
SHA1510a98fa203dd1cae809d814ea623655cc16c4e0
SHA256a327db6aec684d4ad1e111e1827a45a44202a7b03aa261457628a5e73b477db6
SHA51204e32a0af556f4ce0245869eafc6525006fe39a0da1c04f5d001e95926d8ace0dae510c898e23d363dc715bb2b1cbc22e9920f613f27eba1fe01da1b62bef57e
-
Filesize
1KB
MD56a1fdfe21205fa7152f1a85533ad5fa3
SHA14a97a2cc51ba0ff7261a2383ee9de070f7d9a0bd
SHA2566db6786c73b7b91e30d172fc7483adb2ca46a8f651beb4296b1446f85437ab45
SHA5121367dede091d07cc6db8b7643d8f3e42d1cfbf1a3b20ae5670d33f856c3d53d0034490900095a21531dc4bb0d50d52022aa223fc6d3bd36e464a09209bff2e4a