Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
01/08/2023, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
308e8aacd79fdce61897dacf902b0045_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
308e8aacd79fdce61897dacf902b0045_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
308e8aacd79fdce61897dacf902b0045_virlock_JC.exe
-
Size
186KB
-
MD5
308e8aacd79fdce61897dacf902b0045
-
SHA1
3ab56d1356dd08beec0df41c435b08c75815a900
-
SHA256
82600d6fe3cafd081eefd8f17d684d84bdcda92dd5d4e5e55ff3981a050f99f8
-
SHA512
92c48dc152157c583701f3a2aa888e495a1217197ea5778a6b722a82dea7b66ee3f79876a28f1df4510a02eef9f30c3ca23364978382187b230bab2eb0636c0b
-
SSDEEP
3072:HoiPtnCB3Xzo3bZCIsBKNWniW4cX+VYWi2vg23Dpg67Ya:HoicHzoFCVKNWnrxH23L7Ya
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" DllHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1092 HssUUwQc.exe 1884 PUooogsU.exe -
Loads dropped DLL 20 IoCs
pid Process 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PUooogsU.exe = "C:\\ProgramData\\eocksswk\\PUooogsU.exe" PUooogsU.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\HssUUwQc.exe = "C:\\Users\\Admin\\HEgkEkMY\\HssUUwQc.exe" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PUooogsU.exe = "C:\\ProgramData\\eocksswk\\PUooogsU.exe" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-4219371764-2579186923-3390623117-1000\Software\Microsoft\Windows\CurrentVersion\Run\HssUUwQc.exe = "C:\\Users\\Admin\\HEgkEkMY\\HssUUwQc.exe" HssUUwQc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1468 reg.exe 268 reg.exe 1500 reg.exe 2284 reg.exe 824 reg.exe 2884 reg.exe 1196 reg.exe 2656 reg.exe 2580 reg.exe 1704 reg.exe 3052 reg.exe 2880 reg.exe 2052 reg.exe 1696 reg.exe 2884 reg.exe 2460 reg.exe 3044 reg.exe 2976 reg.exe 1944 reg.exe 616 reg.exe 2596 reg.exe 2784 reg.exe 1636 reg.exe 544 reg.exe 2832 reg.exe 1720 reg.exe 268 reg.exe 2692 reg.exe 544 reg.exe 1208 reg.exe 2300 reg.exe 2868 reg.exe 2540 reg.exe 2100 reg.exe 2716 reg.exe 1728 reg.exe 756 reg.exe 1384 reg.exe 1492 reg.exe 680 reg.exe 2140 reg.exe 1948 reg.exe 2620 reg.exe 1540 reg.exe 2124 reg.exe 432 reg.exe 2560 reg.exe 692 reg.exe 1900 reg.exe 2052 reg.exe 2764 reg.exe 2472 reg.exe 2724 reg.exe 2456 reg.exe 2152 reg.exe 1640 reg.exe 980 reg.exe 1900 reg.exe 2432 reg.exe 2176 reg.exe 2912 reg.exe 2016 reg.exe 2136 reg.exe 948 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2832 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2832 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2896 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2896 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1632 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1632 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 596 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 596 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 760 conhost.exe 760 conhost.exe 2816 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2816 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1640 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1640 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2708 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2708 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1176 reg.exe 1176 reg.exe 988 conhost.exe 988 conhost.exe 1728 cscript.exe 1728 cscript.exe 2960 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2960 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2772 reg.exe 2772 reg.exe 2452 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2452 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1736 conhost.exe 1736 conhost.exe 644 reg.exe 644 reg.exe 2392 conhost.exe 2392 conhost.exe 2296 conhost.exe 2296 conhost.exe 2100 reg.exe 2100 reg.exe 852 cmd.exe 852 cmd.exe 2164 cscript.exe 2164 cscript.exe 2268 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2268 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1476 reg.exe 1476 reg.exe 2464 cmd.exe 2464 cmd.exe 3012 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 3012 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 524 conhost.exe 524 conhost.exe 1984 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1984 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 1680 cmd.exe 1680 cmd.exe 1516 conhost.exe 1516 conhost.exe 2504 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 2504 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1092 HssUUwQc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe 1092 HssUUwQc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1092 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 28 PID 1076 wrote to memory of 1092 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 28 PID 1076 wrote to memory of 1092 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 28 PID 1076 wrote to memory of 1092 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 28 PID 1076 wrote to memory of 1884 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 29 PID 1076 wrote to memory of 1884 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 29 PID 1076 wrote to memory of 1884 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 29 PID 1076 wrote to memory of 1884 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 29 PID 1076 wrote to memory of 2480 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 30 PID 1076 wrote to memory of 2480 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 30 PID 1076 wrote to memory of 2480 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 30 PID 1076 wrote to memory of 2480 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 30 PID 2480 wrote to memory of 2104 2480 cmd.exe 33 PID 2480 wrote to memory of 2104 2480 cmd.exe 33 PID 2480 wrote to memory of 2104 2480 cmd.exe 33 PID 2480 wrote to memory of 2104 2480 cmd.exe 33 PID 1076 wrote to memory of 2792 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 32 PID 1076 wrote to memory of 2792 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 32 PID 1076 wrote to memory of 2792 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 32 PID 1076 wrote to memory of 2792 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 32 PID 1076 wrote to memory of 2976 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 34 PID 1076 wrote to memory of 2976 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 34 PID 1076 wrote to memory of 2976 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 34 PID 1076 wrote to memory of 2976 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 34 PID 1076 wrote to memory of 2864 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 36 PID 1076 wrote to memory of 2864 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 36 PID 1076 wrote to memory of 2864 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 36 PID 1076 wrote to memory of 2864 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 36 PID 1076 wrote to memory of 2416 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 39 PID 1076 wrote to memory of 2416 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 39 PID 1076 wrote to memory of 2416 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 39 PID 1076 wrote to memory of 2416 1076 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 39 PID 2416 wrote to memory of 2736 2416 cmd.exe 41 PID 2416 wrote to memory of 2736 2416 cmd.exe 41 PID 2416 wrote to memory of 2736 2416 cmd.exe 41 PID 2416 wrote to memory of 2736 2416 cmd.exe 41 PID 2104 wrote to memory of 2708 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 42 PID 2104 wrote to memory of 2708 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 42 PID 2104 wrote to memory of 2708 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 42 PID 2104 wrote to memory of 2708 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 42 PID 2708 wrote to memory of 2832 2708 cmd.exe 44 PID 2708 wrote to memory of 2832 2708 cmd.exe 44 PID 2708 wrote to memory of 2832 2708 cmd.exe 44 PID 2708 wrote to memory of 2832 2708 cmd.exe 44 PID 2104 wrote to memory of 2460 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 46 PID 2104 wrote to memory of 2460 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 46 PID 2104 wrote to memory of 2460 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 46 PID 2104 wrote to memory of 2460 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 46 PID 2104 wrote to memory of 1340 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 45 PID 2104 wrote to memory of 1340 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 45 PID 2104 wrote to memory of 1340 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 45 PID 2104 wrote to memory of 1340 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 45 PID 2104 wrote to memory of 2472 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 47 PID 2104 wrote to memory of 2472 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 47 PID 2104 wrote to memory of 2472 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 47 PID 2104 wrote to memory of 2472 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 47 PID 2104 wrote to memory of 2640 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 48 PID 2104 wrote to memory of 2640 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 48 PID 2104 wrote to memory of 2640 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 48 PID 2104 wrote to memory of 2640 2104 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe 48 PID 2640 wrote to memory of 1060 2640 cmd.exe 53 PID 2640 wrote to memory of 1060 2640 cmd.exe 53 PID 2640 wrote to memory of 1060 2640 cmd.exe 53 PID 2640 wrote to memory of 1060 2640 cmd.exe 53 -
System policy modification 1 TTPs 26 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 308e8aacd79fdce61897dacf902b0045_virlock_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\HEgkEkMY\HssUUwQc.exe"C:\Users\Admin\HEgkEkMY\HssUUwQc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1092
-
-
C:\ProgramData\eocksswk\PUooogsU.exe"C:\ProgramData\eocksswk\PUooogsU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1884
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"6⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"8⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"10⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"12⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC13⤵PID:760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"14⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"16⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"18⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"20⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC21⤵PID:1176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"22⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC23⤵PID:988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"24⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC25⤵PID:1728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"26⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"28⤵PID:2212
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
PID:2492
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:1996
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\KSMQgsUY.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""28⤵PID:1972
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:1368
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- Modifies registry key
PID:2052
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵PID:1212
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- Modifies registry key
PID:2880
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:1720
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qOoMUcII.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""26⤵
- Modifies visibility of file extensions in Explorer
PID:2964 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵PID:2848
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵PID:2476
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
- Modifies registry key
PID:2432
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:2120
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\isUQUowA.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""24⤵PID:2488
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵PID:2408
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:612
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\qQwUAMIc.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""22⤵PID:1532
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:1576
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:2264
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:1948
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:268
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
- Modifies registry key
PID:680
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵PID:540
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\ioMEkQMQ.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""20⤵PID:1428
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1732
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies registry key
PID:2832
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:2776
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RQoMYoMI.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""18⤵PID:1708
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:1480
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QCgAgoAw.bat" "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exe""16⤵PID:2472
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:2184
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵PID:2168
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:2100
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC15⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"16⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"18⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC19⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"20⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC21⤵PID:644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"22⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC23⤵PID:2392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"24⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC25⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"26⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC27⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"28⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC29⤵PID:852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"30⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC31⤵
- System policy modification
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"32⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"34⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC35⤵PID:1476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"36⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC37⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"38⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC39⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"40⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC41⤵PID:524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"42⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"44⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC45⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"46⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC47⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"48⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC49⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"50⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC51⤵PID:2112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"52⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC53⤵PID:2196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"54⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC55⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"56⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC57⤵PID:2532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"58⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC59⤵PID:1228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"60⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC61⤵PID:2732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"62⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC63⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"64⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC65⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"66⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC67⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"68⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC69⤵PID:432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"70⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC71⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"72⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC73⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"74⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC75⤵PID:1952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"76⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC77⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"78⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC79⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"80⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC81⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"82⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC83⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"84⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC85⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"86⤵
- Modifies visibility of file extensions in Explorer
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC87⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"88⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC89⤵PID:2456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"90⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC91⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"92⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC93⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"94⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC95⤵PID:1888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"96⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC97⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"98⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC99⤵PID:1468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"100⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC101⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"102⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC103⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"104⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC105⤵
- System policy modification
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"106⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC107⤵
- Modifies visibility of file extensions in Explorer
- System policy modification
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"108⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC109⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"110⤵
- UAC bypass
- System policy modification
PID:680 -
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC111⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"112⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC113⤵
- Modifies visibility of file extensions in Explorer
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"114⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC115⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"116⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC117⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"118⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC119⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"120⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC121⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\308e8aacd79fdce61897dacf902b0045_virlock_JC"122⤵PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-