Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_22418b85a99399exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_22418b85a99399exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_22418b85a99399exeexe_JC.exe
-
Size
191KB
-
MD5
22418b85a9939990645a0ea701d9b319
-
SHA1
527372b5807339796d12562fcf3f0bd416d502d7
-
SHA256
ee1ca0a8fe7234bb019b18bc61df207d8615cdba79437ca9983a2c8cb4279432
-
SHA512
a297dee836682489a80ba51fe261901a18990c78883b33a799f2e280244db9bef8619d8715abfd3caa8143d9d68848d797cb2db71515e0d0414ee9686746f572
-
SSDEEP
3072:s3ZF1JAGQaAquTM4OWcg64vZb86j+IwZd2Q911QwsSEoB0ipkOV3:iFJAnaEtOWcqqIPdwo1zOB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Control Panel\International\Geo\Nation yOMwMEcc.exe -
Deletes itself 1 IoCs
pid Process 1060 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2008 yOMwMEcc.exe 2036 IkkQIcUc.exe -
Loads dropped DLL 20 IoCs
pid Process 2024 NA_NA_22418b85a99399exeexe_JC.exe 2024 NA_NA_22418b85a99399exeexe_JC.exe 2024 NA_NA_22418b85a99399exeexe_JC.exe 2024 NA_NA_22418b85a99399exeexe_JC.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IkkQIcUc.exe = "C:\\ProgramData\\AwkIQEAA\\IkkQIcUc.exe" IkkQIcUc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\yOMwMEcc.exe = "C:\\Users\\Admin\\weYsoIEc\\yOMwMEcc.exe" NA_NA_22418b85a99399exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IkkQIcUc.exe = "C:\\ProgramData\\AwkIQEAA\\IkkQIcUc.exe" NA_NA_22418b85a99399exeexe_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\yOMwMEcc.exe = "C:\\Users\\Admin\\weYsoIEc\\yOMwMEcc.exe" yOMwMEcc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_22418b85a99399exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico yOMwMEcc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2716 reg.exe 1608 reg.exe 876 reg.exe 1396 reg.exe 1580 reg.exe 788 reg.exe 1304 reg.exe 1744 reg.exe 964 reg.exe 2024 reg.exe 3036 reg.exe 2752 reg.exe 1680 reg.exe 2164 reg.exe 1580 reg.exe 2784 reg.exe 2996 reg.exe 616 reg.exe 556 reg.exe 1172 reg.exe 2356 reg.exe 1964 reg.exe 1812 reg.exe 2932 reg.exe 2856 reg.exe 2112 reg.exe 2408 reg.exe 1944 reg.exe 2796 reg.exe 900 reg.exe 1704 reg.exe 824 reg.exe 1680 reg.exe 2796 reg.exe 1520 reg.exe 1056 reg.exe 2972 reg.exe 1960 reg.exe 1580 reg.exe 2780 reg.exe 556 reg.exe 2708 reg.exe 2736 reg.exe 2436 reg.exe 980 reg.exe 1056 reg.exe 2908 reg.exe 2448 reg.exe 2064 reg.exe 2108 reg.exe 1960 reg.exe 2468 reg.exe 900 reg.exe 1864 reg.exe 1592 reg.exe 1172 reg.exe 2688 reg.exe 1680 reg.exe 1352 reg.exe 2244 reg.exe 2544 reg.exe 2400 reg.exe 1316 reg.exe 1972 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2024 NA_NA_22418b85a99399exeexe_JC.exe 2024 NA_NA_22418b85a99399exeexe_JC.exe 2980 NA_NA_22418b85a99399exeexe_JC.exe 2980 NA_NA_22418b85a99399exeexe_JC.exe 1492 NA_NA_22418b85a99399exeexe_JC.exe 1492 NA_NA_22418b85a99399exeexe_JC.exe 1964 NA_NA_22418b85a99399exeexe_JC.exe 1964 NA_NA_22418b85a99399exeexe_JC.exe 3068 NA_NA_22418b85a99399exeexe_JC.exe 3068 NA_NA_22418b85a99399exeexe_JC.exe 1712 Process not Found 1712 Process not Found 2668 NA_NA_22418b85a99399exeexe_JC.exe 2668 NA_NA_22418b85a99399exeexe_JC.exe 2780 reg.exe 2780 reg.exe 1604 NA_NA_22418b85a99399exeexe_JC.exe 1604 NA_NA_22418b85a99399exeexe_JC.exe 1612 conhost.exe 1612 conhost.exe 1352 NA_NA_22418b85a99399exeexe_JC.exe 1352 NA_NA_22418b85a99399exeexe_JC.exe 2964 NA_NA_22418b85a99399exeexe_JC.exe 2964 NA_NA_22418b85a99399exeexe_JC.exe 2860 NA_NA_22418b85a99399exeexe_JC.exe 2860 NA_NA_22418b85a99399exeexe_JC.exe 2668 NA_NA_22418b85a99399exeexe_JC.exe 2668 NA_NA_22418b85a99399exeexe_JC.exe 2752 reg.exe 2752 reg.exe 1040 NA_NA_22418b85a99399exeexe_JC.exe 1040 NA_NA_22418b85a99399exeexe_JC.exe 1540 NA_NA_22418b85a99399exeexe_JC.exe 1540 NA_NA_22418b85a99399exeexe_JC.exe 1208 cscript.exe 1208 cscript.exe 2900 NA_NA_22418b85a99399exeexe_JC.exe 2900 NA_NA_22418b85a99399exeexe_JC.exe 2496 reg.exe 2496 reg.exe 1316 conhost.exe 1316 conhost.exe 2092 reg.exe 2092 reg.exe 1788 NA_NA_22418b85a99399exeexe_JC.exe 1788 NA_NA_22418b85a99399exeexe_JC.exe 1744 reg.exe 1744 reg.exe 2196 conhost.exe 2196 conhost.exe 1340 conhost.exe 1340 conhost.exe 2952 cmd.exe 2952 cmd.exe 1832 conhost.exe 1832 conhost.exe 1080 cscript.exe 1080 cscript.exe 1252 conhost.exe 1252 conhost.exe 2548 cscript.exe 2548 cscript.exe 3028 conhost.exe 3028 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2008 yOMwMEcc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe 2008 yOMwMEcc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2008 2024 NA_NA_22418b85a99399exeexe_JC.exe 28 PID 2024 wrote to memory of 2008 2024 NA_NA_22418b85a99399exeexe_JC.exe 28 PID 2024 wrote to memory of 2008 2024 NA_NA_22418b85a99399exeexe_JC.exe 28 PID 2024 wrote to memory of 2008 2024 NA_NA_22418b85a99399exeexe_JC.exe 28 PID 2024 wrote to memory of 2036 2024 NA_NA_22418b85a99399exeexe_JC.exe 29 PID 2024 wrote to memory of 2036 2024 NA_NA_22418b85a99399exeexe_JC.exe 29 PID 2024 wrote to memory of 2036 2024 NA_NA_22418b85a99399exeexe_JC.exe 29 PID 2024 wrote to memory of 2036 2024 NA_NA_22418b85a99399exeexe_JC.exe 29 PID 2024 wrote to memory of 3016 2024 NA_NA_22418b85a99399exeexe_JC.exe 30 PID 2024 wrote to memory of 3016 2024 NA_NA_22418b85a99399exeexe_JC.exe 30 PID 2024 wrote to memory of 3016 2024 NA_NA_22418b85a99399exeexe_JC.exe 30 PID 2024 wrote to memory of 3016 2024 NA_NA_22418b85a99399exeexe_JC.exe 30 PID 3016 wrote to memory of 2980 3016 cmd.exe 32 PID 3016 wrote to memory of 2980 3016 cmd.exe 32 PID 3016 wrote to memory of 2980 3016 cmd.exe 32 PID 3016 wrote to memory of 2980 3016 cmd.exe 32 PID 2024 wrote to memory of 2740 2024 NA_NA_22418b85a99399exeexe_JC.exe 33 PID 2024 wrote to memory of 2740 2024 NA_NA_22418b85a99399exeexe_JC.exe 33 PID 2024 wrote to memory of 2740 2024 NA_NA_22418b85a99399exeexe_JC.exe 33 PID 2024 wrote to memory of 2740 2024 NA_NA_22418b85a99399exeexe_JC.exe 33 PID 2024 wrote to memory of 3000 2024 NA_NA_22418b85a99399exeexe_JC.exe 34 PID 2024 wrote to memory of 3000 2024 NA_NA_22418b85a99399exeexe_JC.exe 34 PID 2024 wrote to memory of 3000 2024 NA_NA_22418b85a99399exeexe_JC.exe 34 PID 2024 wrote to memory of 3000 2024 NA_NA_22418b85a99399exeexe_JC.exe 34 PID 2024 wrote to memory of 2716 2024 NA_NA_22418b85a99399exeexe_JC.exe 36 PID 2024 wrote to memory of 2716 2024 NA_NA_22418b85a99399exeexe_JC.exe 36 PID 2024 wrote to memory of 2716 2024 NA_NA_22418b85a99399exeexe_JC.exe 36 PID 2024 wrote to memory of 2716 2024 NA_NA_22418b85a99399exeexe_JC.exe 36 PID 2024 wrote to memory of 2380 2024 NA_NA_22418b85a99399exeexe_JC.exe 42 PID 2024 wrote to memory of 2380 2024 NA_NA_22418b85a99399exeexe_JC.exe 42 PID 2024 wrote to memory of 2380 2024 NA_NA_22418b85a99399exeexe_JC.exe 42 PID 2024 wrote to memory of 2380 2024 NA_NA_22418b85a99399exeexe_JC.exe 42 PID 2980 wrote to memory of 556 2980 NA_NA_22418b85a99399exeexe_JC.exe 37 PID 2980 wrote to memory of 556 2980 NA_NA_22418b85a99399exeexe_JC.exe 37 PID 2980 wrote to memory of 556 2980 NA_NA_22418b85a99399exeexe_JC.exe 37 PID 2980 wrote to memory of 556 2980 NA_NA_22418b85a99399exeexe_JC.exe 37 PID 2980 wrote to memory of 640 2980 NA_NA_22418b85a99399exeexe_JC.exe 43 PID 2980 wrote to memory of 640 2980 NA_NA_22418b85a99399exeexe_JC.exe 43 PID 2980 wrote to memory of 640 2980 NA_NA_22418b85a99399exeexe_JC.exe 43 PID 2980 wrote to memory of 640 2980 NA_NA_22418b85a99399exeexe_JC.exe 43 PID 2980 wrote to memory of 1384 2980 NA_NA_22418b85a99399exeexe_JC.exe 53 PID 2980 wrote to memory of 1384 2980 NA_NA_22418b85a99399exeexe_JC.exe 53 PID 2980 wrote to memory of 1384 2980 NA_NA_22418b85a99399exeexe_JC.exe 53 PID 2980 wrote to memory of 1384 2980 NA_NA_22418b85a99399exeexe_JC.exe 53 PID 2980 wrote to memory of 1616 2980 NA_NA_22418b85a99399exeexe_JC.exe 52 PID 2980 wrote to memory of 1616 2980 NA_NA_22418b85a99399exeexe_JC.exe 52 PID 2980 wrote to memory of 1616 2980 NA_NA_22418b85a99399exeexe_JC.exe 52 PID 2980 wrote to memory of 1616 2980 NA_NA_22418b85a99399exeexe_JC.exe 52 PID 556 wrote to memory of 1492 556 cmd.exe 51 PID 556 wrote to memory of 1492 556 cmd.exe 51 PID 556 wrote to memory of 1492 556 cmd.exe 51 PID 556 wrote to memory of 1492 556 cmd.exe 51 PID 2980 wrote to memory of 2080 2980 NA_NA_22418b85a99399exeexe_JC.exe 49 PID 2980 wrote to memory of 2080 2980 NA_NA_22418b85a99399exeexe_JC.exe 49 PID 2980 wrote to memory of 2080 2980 NA_NA_22418b85a99399exeexe_JC.exe 49 PID 2980 wrote to memory of 2080 2980 NA_NA_22418b85a99399exeexe_JC.exe 49 PID 2380 wrote to memory of 2804 2380 cmd.exe 46 PID 2380 wrote to memory of 2804 2380 cmd.exe 46 PID 2380 wrote to memory of 2804 2380 cmd.exe 46 PID 2380 wrote to memory of 2804 2380 cmd.exe 46 PID 2080 wrote to memory of 2928 2080 cmd.exe 45 PID 2080 wrote to memory of 2928 2080 cmd.exe 45 PID 2080 wrote to memory of 2928 2080 cmd.exe 45 PID 2080 wrote to memory of 2928 2080 cmd.exe 45 -
System policy modification 1 TTPs 26 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_22418b85a99399exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\weYsoIEc\yOMwMEcc.exe"C:\Users\Admin\weYsoIEc\yOMwMEcc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2008
-
-
C:\ProgramData\AwkIQEAA\IkkQIcUc.exe"C:\ProgramData\AwkIQEAA\IkkQIcUc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2036
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"6⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"8⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"10⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC11⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"12⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC13⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"14⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC15⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"16⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"18⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC19⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"20⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"22⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"24⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"26⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"28⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC29⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"30⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"32⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"34⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:624 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC35⤵PID:1208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"36⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC37⤵
- Modifies visibility of file extensions in Explorer
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"38⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC39⤵PID:2496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"40⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC41⤵PID:1316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"42⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC43⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"44⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"46⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC47⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"48⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC49⤵PID:2196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"50⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC51⤵PID:1340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"52⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC53⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"54⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC55⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"56⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC57⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"58⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC59⤵PID:1252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"60⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC61⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"62⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC63⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"64⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC65⤵PID:524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"66⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC67⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"68⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC69⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"70⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC71⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"72⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC73⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"74⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC75⤵PID:1156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"76⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC77⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"78⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC79⤵
- Modifies visibility of file extensions in Explorer
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"80⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC81⤵PID:2468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"82⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC83⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"84⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC85⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"86⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC87⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"88⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC89⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"90⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC91⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"92⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC93⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"94⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC95⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"96⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC97⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"98⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC99⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"100⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC101⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"102⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC103⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"104⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC105⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"106⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC107⤵PID:2768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"108⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC109⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"110⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC111⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"112⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC113⤵PID:2864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"114⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC115⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"116⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC117⤵PID:1248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"118⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC119⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"120⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC121⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_22418b85a99399exeexe_JC"122⤵PID:2512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-