Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
23/07/2023, 19:27
Static task
static1
Behavioral task
behavioral1
Sample
NA_NA_2d34622b6cb901exeexe_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
NA_NA_2d34622b6cb901exeexe_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
NA_NA_2d34622b6cb901exeexe_JC.exe
-
Size
188KB
-
MD5
2d34622b6cb901fb6d8e7962013fa7ce
-
SHA1
dbd00f27701b7562c35f95c9406fcfb2478c5689
-
SHA256
d51005566d6f266222b5a045a6501ae14a08c025289f9d35b84ac78075dc627b
-
SHA512
fd2de669d44c4fd9bb87ca7a82131cc4881b0eb42f2b69d433aafa6d013da6412e95835ba19e0921d9f72ce88804be7337cac87938003b5fa85083ba550818c5
-
SSDEEP
3072:sZ5Hia/55Kj67/rTnpv6tmWipWGcxK28r9KXvwFQVu1tJe0LchFD9O:25Ca2m7/fnpyCI0G2QsBIhFDM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Control Panel\International\Geo\Nation DWgEAQUs.exe -
Executes dropped EXE 2 IoCs
pid Process 1604 vewMYckw.exe 1832 DWgEAQUs.exe -
Loads dropped DLL 20 IoCs
pid Process 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\vewMYckw.exe = "C:\\Users\\Admin\\PcIgcwoo\\vewMYckw.exe" vewMYckw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DWgEAQUs.exe = "C:\\ProgramData\\zKEEQswk\\DWgEAQUs.exe" DWgEAQUs.exe Set value (str) \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows\CurrentVersion\Run\vewMYckw.exe = "C:\\Users\\Admin\\PcIgcwoo\\vewMYckw.exe" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DWgEAQUs.exe = "C:\\ProgramData\\zKEEQswk\\DWgEAQUs.exe" NA_NA_2d34622b6cb901exeexe_JC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_2d34622b6cb901exeexe_JC.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2788 reg.exe 1172 reg.exe 3024 reg.exe 1296 reg.exe 2528 reg.exe 2772 reg.exe 2008 reg.exe 580 reg.exe 1592 reg.exe 2460 reg.exe 2976 reg.exe 1244 reg.exe 3060 reg.exe 1924 reg.exe 948 reg.exe 2836 reg.exe 2876 reg.exe 2856 reg.exe 1588 reg.exe 3004 reg.exe 2820 reg.exe 1496 reg.exe 2440 reg.exe 2120 reg.exe 2720 reg.exe 1172 reg.exe 1140 reg.exe 2840 reg.exe 1768 reg.exe 2920 reg.exe 268 reg.exe 1448 reg.exe 1272 reg.exe 2564 reg.exe 1572 reg.exe 1648 reg.exe 2908 reg.exe 2080 reg.exe 3040 reg.exe 2440 reg.exe 1008 reg.exe 1804 reg.exe 3048 reg.exe 2132 reg.exe 2192 reg.exe 2240 reg.exe 2372 reg.exe 2268 reg.exe 888 reg.exe 2872 reg.exe 752 reg.exe 2756 reg.exe 472 reg.exe 1848 reg.exe 2784 reg.exe 2144 reg.exe 1520 reg.exe 1916 reg.exe 2600 reg.exe 1520 reg.exe 1572 reg.exe 2132 reg.exe 2236 reg.exe 748 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 1624 NA_NA_2d34622b6cb901exeexe_JC.exe 1624 NA_NA_2d34622b6cb901exeexe_JC.exe 1772 NA_NA_2d34622b6cb901exeexe_JC.exe 1772 NA_NA_2d34622b6cb901exeexe_JC.exe 1936 NA_NA_2d34622b6cb901exeexe_JC.exe 1936 NA_NA_2d34622b6cb901exeexe_JC.exe 868 NA_NA_2d34622b6cb901exeexe_JC.exe 868 NA_NA_2d34622b6cb901exeexe_JC.exe 1612 cscript.exe 1612 cscript.exe 2768 NA_NA_2d34622b6cb901exeexe_JC.exe 2768 NA_NA_2d34622b6cb901exeexe_JC.exe 856 NA_NA_2d34622b6cb901exeexe_JC.exe 856 NA_NA_2d34622b6cb901exeexe_JC.exe 2908 Process not Found 2908 Process not Found 1772 NA_NA_2d34622b6cb901exeexe_JC.exe 1772 NA_NA_2d34622b6cb901exeexe_JC.exe 3068 conhost.exe 3068 conhost.exe 788 NA_NA_2d34622b6cb901exeexe_JC.exe 788 NA_NA_2d34622b6cb901exeexe_JC.exe 484 NA_NA_2d34622b6cb901exeexe_JC.exe 484 NA_NA_2d34622b6cb901exeexe_JC.exe 2960 NA_NA_2d34622b6cb901exeexe_JC.exe 2960 NA_NA_2d34622b6cb901exeexe_JC.exe 1636 NA_NA_2d34622b6cb901exeexe_JC.exe 1636 NA_NA_2d34622b6cb901exeexe_JC.exe 624 NA_NA_2d34622b6cb901exeexe_JC.exe 624 NA_NA_2d34622b6cb901exeexe_JC.exe 768 conhost.exe 768 conhost.exe 1976 NA_NA_2d34622b6cb901exeexe_JC.exe 1976 NA_NA_2d34622b6cb901exeexe_JC.exe 2936 reg.exe 2936 reg.exe 1784 reg.exe 1784 reg.exe 300 conhost.exe 300 conhost.exe 2164 conhost.exe 2164 conhost.exe 1532 reg.exe 1532 reg.exe 2728 NA_NA_2d34622b6cb901exeexe_JC.exe 2728 NA_NA_2d34622b6cb901exeexe_JC.exe 1992 cscript.exe 1992 cscript.exe 1848 cmd.exe 1848 cmd.exe 1692 cmd.exe 1692 cmd.exe 2272 NA_NA_2d34622b6cb901exeexe_JC.exe 2272 NA_NA_2d34622b6cb901exeexe_JC.exe 1792 conhost.exe 1792 conhost.exe 2504 cscript.exe 2504 cscript.exe 2772 reg.exe 2772 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1832 DWgEAQUs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe 1832 DWgEAQUs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1604 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 28 PID 2148 wrote to memory of 1604 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 28 PID 2148 wrote to memory of 1604 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 28 PID 2148 wrote to memory of 1604 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 28 PID 2148 wrote to memory of 1832 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 29 PID 2148 wrote to memory of 1832 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 29 PID 2148 wrote to memory of 1832 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 29 PID 2148 wrote to memory of 1832 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 29 PID 2148 wrote to memory of 2840 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 30 PID 2148 wrote to memory of 2840 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 30 PID 2148 wrote to memory of 2840 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 30 PID 2148 wrote to memory of 2840 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 30 PID 2840 wrote to memory of 2892 2840 cmd.exe 33 PID 2840 wrote to memory of 2892 2840 cmd.exe 33 PID 2840 wrote to memory of 2892 2840 cmd.exe 33 PID 2840 wrote to memory of 2892 2840 cmd.exe 33 PID 2148 wrote to memory of 2772 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 32 PID 2148 wrote to memory of 2772 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 32 PID 2148 wrote to memory of 2772 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 32 PID 2148 wrote to memory of 2772 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 32 PID 2148 wrote to memory of 2156 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 35 PID 2148 wrote to memory of 2156 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 35 PID 2148 wrote to memory of 2156 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 35 PID 2148 wrote to memory of 2156 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 35 PID 2148 wrote to memory of 2704 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 36 PID 2148 wrote to memory of 2704 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 36 PID 2148 wrote to memory of 2704 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 36 PID 2148 wrote to memory of 2704 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 36 PID 2148 wrote to memory of 2700 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 40 PID 2148 wrote to memory of 2700 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 40 PID 2148 wrote to memory of 2700 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 40 PID 2148 wrote to memory of 2700 2148 NA_NA_2d34622b6cb901exeexe_JC.exe 40 PID 2700 wrote to memory of 2204 2700 cmd.exe 41 PID 2700 wrote to memory of 2204 2700 cmd.exe 41 PID 2700 wrote to memory of 2204 2700 cmd.exe 41 PID 2700 wrote to memory of 2204 2700 cmd.exe 41 PID 2892 wrote to memory of 1672 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 42 PID 2892 wrote to memory of 1672 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 42 PID 2892 wrote to memory of 1672 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 42 PID 2892 wrote to memory of 1672 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 42 PID 1672 wrote to memory of 1624 1672 cmd.exe 44 PID 1672 wrote to memory of 1624 1672 cmd.exe 44 PID 1672 wrote to memory of 1624 1672 cmd.exe 44 PID 1672 wrote to memory of 1624 1672 cmd.exe 44 PID 2892 wrote to memory of 800 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 45 PID 2892 wrote to memory of 800 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 45 PID 2892 wrote to memory of 800 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 45 PID 2892 wrote to memory of 800 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 45 PID 2892 wrote to memory of 1652 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 46 PID 2892 wrote to memory of 1652 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 46 PID 2892 wrote to memory of 1652 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 46 PID 2892 wrote to memory of 1652 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 46 PID 2892 wrote to memory of 2976 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 48 PID 2892 wrote to memory of 2976 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 48 PID 2892 wrote to memory of 2976 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 48 PID 2892 wrote to memory of 2976 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 48 PID 2892 wrote to memory of 2688 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 50 PID 2892 wrote to memory of 2688 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 50 PID 2892 wrote to memory of 2688 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 50 PID 2892 wrote to memory of 2688 2892 NA_NA_2d34622b6cb901exeexe_JC.exe 50 PID 2688 wrote to memory of 2736 2688 cmd.exe 53 PID 2688 wrote to memory of 2736 2688 cmd.exe 53 PID 2688 wrote to memory of 2736 2688 cmd.exe 53 PID 2688 wrote to memory of 2736 2688 cmd.exe 53 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_2d34622b6cb901exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_2d34622b6cb901exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System NA_NA_2d34622b6cb901exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NA_NA_2d34622b6cb901exeexe_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exe"C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\PcIgcwoo\vewMYckw.exe"C:\Users\Admin\PcIgcwoo\vewMYckw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1604
-
-
C:\ProgramData\zKEEQswk\DWgEAQUs.exe"C:\ProgramData\zKEEQswk\DWgEAQUs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1832
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"6⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC7⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"8⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"10⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"12⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC13⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"14⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"16⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"18⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC19⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"20⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"22⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC23⤵PID:3068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"24⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"26⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"28⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"30⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"32⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC33⤵
- Suspicious behavior: EnumeratesProcesses
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"34⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC35⤵PID:768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"36⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"38⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC39⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"40⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC41⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"42⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC43⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"44⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC45⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"46⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC47⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"48⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"50⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC51⤵PID:1992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"52⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC53⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"54⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC55⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"56⤵
- Checks whether UAC is enabled
- System policy modification
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"58⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC59⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"60⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC61⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"62⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC63⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"64⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC65⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"66⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC67⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"68⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC69⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"70⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC71⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"72⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC73⤵PID:2344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"74⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC75⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"76⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC77⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"78⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC79⤵PID:864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"80⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC81⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"82⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC83⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"84⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC85⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"86⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC87⤵PID:1528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"88⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC89⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"90⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC91⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"92⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:472 -
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC93⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"94⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC95⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"96⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC97⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"98⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC99⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"100⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC101⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"102⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC103⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"104⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC105⤵PID:1028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"106⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC107⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"108⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC109⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"110⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC111⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"112⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC113⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"114⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC115⤵PID:1780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"116⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC117⤵PID:2356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"118⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC119⤵PID:1816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"120⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC.exeC:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC121⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\NA_NA_2d34622b6cb901exeexe_JC"122⤵PID:1272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-