Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
16-07-2023 13:07
Static task
static1
Behavioral task
behavioral1
Sample
70fc1cb8040d8c_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
70fc1cb8040d8c_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
70fc1cb8040d8c_JC.exe
-
Size
329KB
-
MD5
70fc1cb8040d8cf805935315c7748542
-
SHA1
c266c308eac95687553a3577fee1438714681535
-
SHA256
84723ebfd4d98baaf0cd21ebd0fc695734ea99ecd946d9ba334199de65d0221a
-
SHA512
5e0ced633bf82472886b8c5fa15701a5d1cddeb262a10d44930955e0cf6da7e720323bb7e2ea73150e186e30dce8d7066c34f32fa8761c86440725718c140414
-
SSDEEP
6144:jVBjI4zHp2b1I1NXp3AdoIFr52mmWGZNBS5qldVbNb5vx+FF95ri1HswCDXNrGV9:7IQ0b1IX90oIFr52mC3S5q5to5W1HAjk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 70fc1cb8040d8c_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" wmiprvse.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 70fc1cb8040d8c_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Control Panel\International\Geo\Nation zwwkgogE.exe -
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2136 zwwkgogE.exe 2840 AWocoQUc.exe -
Loads dropped DLL 20 IoCs
pid Process 2316 70fc1cb8040d8c_JC.exe 2316 70fc1cb8040d8c_JC.exe 2316 70fc1cb8040d8c_JC.exe 2316 70fc1cb8040d8c_JC.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AWocoQUc.exe = "C:\\ProgramData\\BEIgIEUY\\AWocoQUc.exe" AWocoQUc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\zUUkUYAk.exe = "C:\\Users\\Admin\\zCUoUoUs\\zUUkUYAk.exe" 70fc1cb8040d8c_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\racQUUUE.exe = "C:\\ProgramData\\jOkAUgIE\\racQUUUE.exe" 70fc1cb8040d8c_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\zwwkgogE.exe = "C:\\Users\\Admin\\iWMEcIkc\\zwwkgogE.exe" 70fc1cb8040d8c_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AWocoQUc.exe = "C:\\ProgramData\\BEIgIEUY\\AWocoQUc.exe" 70fc1cb8040d8c_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\zwwkgogE.exe = "C:\\Users\\Admin\\iWMEcIkc\\zwwkgogE.exe" zwwkgogE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico zwwkgogE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 304 2336 WerFault.exe 258 2192 1476 WerFault.exe 262 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1524 reg.exe 1568 reg.exe 2500 reg.exe 1920 reg.exe 2440 reg.exe 1968 reg.exe 2132 reg.exe 3032 reg.exe 1504 reg.exe 2324 reg.exe 2616 reg.exe 2004 reg.exe 1496 reg.exe 2588 reg.exe 1760 reg.exe 2368 reg.exe 1084 reg.exe 2400 reg.exe 1816 reg.exe 1868 reg.exe 988 reg.exe 1920 reg.exe 2376 reg.exe 1600 reg.exe 2760 reg.exe 1508 reg.exe 1088 reg.exe 1076 reg.exe 2408 reg.exe 1980 reg.exe 2220 reg.exe 672 reg.exe 2872 reg.exe 2696 reg.exe 852 reg.exe 2836 reg.exe 1576 reg.exe 2040 reg.exe 3064 reg.exe 1940 reg.exe 2992 reg.exe 1068 reg.exe 308 reg.exe 3068 reg.exe 284 reg.exe 1608 reg.exe 1472 reg.exe 940 reg.exe 656 reg.exe 1720 reg.exe 2240 reg.exe 1188 reg.exe 2092 reg.exe 2344 reg.exe 1932 reg.exe 1660 reg.exe 1916 reg.exe 1196 reg.exe 2420 reg.exe 2168 reg.exe 1640 reg.exe 1996 reg.exe 1732 reg.exe 2324 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 70fc1cb8040d8c_JC.exe 2316 70fc1cb8040d8c_JC.exe 3028 70fc1cb8040d8c_JC.exe 3028 70fc1cb8040d8c_JC.exe 2160 70fc1cb8040d8c_JC.exe 2160 70fc1cb8040d8c_JC.exe 1196 70fc1cb8040d8c_JC.exe 1196 70fc1cb8040d8c_JC.exe 2240 70fc1cb8040d8c_JC.exe 2240 70fc1cb8040d8c_JC.exe 1100 reg.exe 1100 reg.exe 1080 reg.exe 1080 reg.exe 2844 70fc1cb8040d8c_JC.exe 2844 70fc1cb8040d8c_JC.exe 3044 Process not Found 3044 Process not Found 1912 cmd.exe 1912 cmd.exe 2104 70fc1cb8040d8c_JC.exe 2104 70fc1cb8040d8c_JC.exe 1520 conhost.exe 1520 conhost.exe 2612 70fc1cb8040d8c_JC.exe 2612 70fc1cb8040d8c_JC.exe 2952 cmd.exe 2952 cmd.exe 2508 70fc1cb8040d8c_JC.exe 2508 70fc1cb8040d8c_JC.exe 1892 70fc1cb8040d8c_JC.exe 1892 70fc1cb8040d8c_JC.exe 2312 cscript.exe 2312 cscript.exe 1420 reg.exe 1420 reg.exe 2984 conhost.exe 2984 conhost.exe 1820 conhost.exe 1820 conhost.exe 2176 cscript.exe 2176 cscript.exe 1892 conhost.exe 1892 conhost.exe 2268 cscript.exe 2268 cscript.exe 1600 cscript.exe 1600 cscript.exe 2432 reg.exe 2432 reg.exe 2924 conhost.exe 2924 conhost.exe 2160 conhost.exe 2160 conhost.exe 1416 cmd.exe 1416 cmd.exe 1904 reg.exe 1904 reg.exe 3052 cscript.exe 3052 cscript.exe 2248 70fc1cb8040d8c_JC.exe 2248 70fc1cb8040d8c_JC.exe 760 conhost.exe 760 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2136 zwwkgogE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe 2136 zwwkgogE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2136 2316 70fc1cb8040d8c_JC.exe 28 PID 2316 wrote to memory of 2136 2316 70fc1cb8040d8c_JC.exe 28 PID 2316 wrote to memory of 2136 2316 70fc1cb8040d8c_JC.exe 28 PID 2316 wrote to memory of 2136 2316 70fc1cb8040d8c_JC.exe 28 PID 2316 wrote to memory of 2840 2316 70fc1cb8040d8c_JC.exe 29 PID 2316 wrote to memory of 2840 2316 70fc1cb8040d8c_JC.exe 29 PID 2316 wrote to memory of 2840 2316 70fc1cb8040d8c_JC.exe 29 PID 2316 wrote to memory of 2840 2316 70fc1cb8040d8c_JC.exe 29 PID 2316 wrote to memory of 2800 2316 70fc1cb8040d8c_JC.exe 30 PID 2316 wrote to memory of 2800 2316 70fc1cb8040d8c_JC.exe 30 PID 2316 wrote to memory of 2800 2316 70fc1cb8040d8c_JC.exe 30 PID 2316 wrote to memory of 2800 2316 70fc1cb8040d8c_JC.exe 30 PID 2800 wrote to memory of 3028 2800 cmd.exe 33 PID 2800 wrote to memory of 3028 2800 cmd.exe 33 PID 2800 wrote to memory of 3028 2800 cmd.exe 33 PID 2800 wrote to memory of 3028 2800 cmd.exe 33 PID 2316 wrote to memory of 2916 2316 70fc1cb8040d8c_JC.exe 32 PID 2316 wrote to memory of 2916 2316 70fc1cb8040d8c_JC.exe 32 PID 2316 wrote to memory of 2916 2316 70fc1cb8040d8c_JC.exe 32 PID 2316 wrote to memory of 2916 2316 70fc1cb8040d8c_JC.exe 32 PID 2316 wrote to memory of 2712 2316 70fc1cb8040d8c_JC.exe 34 PID 2316 wrote to memory of 2712 2316 70fc1cb8040d8c_JC.exe 34 PID 2316 wrote to memory of 2712 2316 70fc1cb8040d8c_JC.exe 34 PID 2316 wrote to memory of 2712 2316 70fc1cb8040d8c_JC.exe 34 PID 2316 wrote to memory of 2752 2316 70fc1cb8040d8c_JC.exe 36 PID 2316 wrote to memory of 2752 2316 70fc1cb8040d8c_JC.exe 36 PID 2316 wrote to memory of 2752 2316 70fc1cb8040d8c_JC.exe 36 PID 2316 wrote to memory of 2752 2316 70fc1cb8040d8c_JC.exe 36 PID 2316 wrote to memory of 2744 2316 70fc1cb8040d8c_JC.exe 38 PID 2316 wrote to memory of 2744 2316 70fc1cb8040d8c_JC.exe 38 PID 2316 wrote to memory of 2744 2316 70fc1cb8040d8c_JC.exe 38 PID 2316 wrote to memory of 2744 2316 70fc1cb8040d8c_JC.exe 38 PID 3028 wrote to memory of 1104 3028 70fc1cb8040d8c_JC.exe 39 PID 3028 wrote to memory of 1104 3028 70fc1cb8040d8c_JC.exe 39 PID 3028 wrote to memory of 1104 3028 70fc1cb8040d8c_JC.exe 39 PID 3028 wrote to memory of 1104 3028 70fc1cb8040d8c_JC.exe 39 PID 1104 wrote to memory of 2160 1104 cmd.exe 43 PID 1104 wrote to memory of 2160 1104 cmd.exe 43 PID 1104 wrote to memory of 2160 1104 cmd.exe 43 PID 1104 wrote to memory of 2160 1104 cmd.exe 43 PID 3028 wrote to memory of 816 3028 70fc1cb8040d8c_JC.exe 45 PID 3028 wrote to memory of 816 3028 70fc1cb8040d8c_JC.exe 45 PID 3028 wrote to memory of 816 3028 70fc1cb8040d8c_JC.exe 45 PID 3028 wrote to memory of 816 3028 70fc1cb8040d8c_JC.exe 45 PID 3028 wrote to memory of 1668 3028 70fc1cb8040d8c_JC.exe 44 PID 3028 wrote to memory of 1668 3028 70fc1cb8040d8c_JC.exe 44 PID 3028 wrote to memory of 1668 3028 70fc1cb8040d8c_JC.exe 44 PID 3028 wrote to memory of 1668 3028 70fc1cb8040d8c_JC.exe 44 PID 3028 wrote to memory of 2784 3028 70fc1cb8040d8c_JC.exe 46 PID 3028 wrote to memory of 2784 3028 70fc1cb8040d8c_JC.exe 46 PID 3028 wrote to memory of 2784 3028 70fc1cb8040d8c_JC.exe 46 PID 3028 wrote to memory of 2784 3028 70fc1cb8040d8c_JC.exe 46 PID 3028 wrote to memory of 2132 3028 70fc1cb8040d8c_JC.exe 49 PID 3028 wrote to memory of 2132 3028 70fc1cb8040d8c_JC.exe 49 PID 3028 wrote to memory of 2132 3028 70fc1cb8040d8c_JC.exe 49 PID 3028 wrote to memory of 2132 3028 70fc1cb8040d8c_JC.exe 49 PID 2744 wrote to memory of 2168 2744 cmd.exe 50 PID 2744 wrote to memory of 2168 2744 cmd.exe 50 PID 2744 wrote to memory of 2168 2744 cmd.exe 50 PID 2744 wrote to memory of 2168 2744 cmd.exe 50 PID 2132 wrote to memory of 612 2132 cmd.exe 53 PID 2132 wrote to memory of 612 2132 cmd.exe 53 PID 2132 wrote to memory of 612 2132 cmd.exe 53 PID 2132 wrote to memory of 612 2132 cmd.exe 53 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exe"C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\iWMEcIkc\zwwkgogE.exe"C:\Users\Admin\iWMEcIkc\zwwkgogE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2136
-
-
C:\ProgramData\BEIgIEUY\AWocoQUc.exe"C:\ProgramData\BEIgIEUY\AWocoQUc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2840
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"6⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"8⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"10⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC11⤵PID:1100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"12⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC13⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"14⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"16⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC17⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"18⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC19⤵PID:1912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"20⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"22⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC23⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"24⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"26⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC27⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"28⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"30⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC31⤵PID:1892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"32⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC33⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"34⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC35⤵PID:1420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"36⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC37⤵PID:2984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"38⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC39⤵
- Adds Run key to start application
PID:2112 -
C:\Users\Admin\zCUoUoUs\zUUkUYAk.exe"C:\Users\Admin\zCUoUoUs\zUUkUYAk.exe"40⤵PID:2336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 3641⤵
- Program crash
PID:304
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"40⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC41⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"42⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC43⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"44⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"46⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC47⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"48⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC49⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"50⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC51⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"52⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC53⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"54⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC55⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"56⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC57⤵PID:1416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"58⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC59⤵PID:1904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"60⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC61⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"62⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"64⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC65⤵PID:760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"66⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC67⤵PID:344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"68⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC69⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"70⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC71⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"72⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC73⤵PID:2552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"74⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC75⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"76⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC77⤵PID:916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"78⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC79⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"80⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC81⤵
- Modifies visibility of file extensions in Explorer
PID:284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"82⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC83⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"84⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC85⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"86⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC87⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"88⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC89⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"90⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC91⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"92⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC93⤵PID:1416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"94⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC95⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"96⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC97⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"98⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC99⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"100⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC101⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"102⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC103⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"104⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC105⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"106⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC107⤵PID:2080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"108⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC109⤵PID:592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"110⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC111⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"112⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:864 -
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC113⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"114⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC115⤵PID:2468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"116⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC117⤵PID:1868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"118⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC119⤵PID:940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"120⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC.exeC:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC121⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\70fc1cb8040d8c_JC"122⤵PID:2172
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-