Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2023, 11:08
Static task
static1
Behavioral task
behavioral1
Sample
82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe
-
Size
193KB
-
MD5
82f5e411ef65e9be31d9cbeb2589e679
-
SHA1
c670c77887ecaf164040fd67a0819442af8c66fc
-
SHA256
0c13d0a680ca5ffa8c135872cc0366156e49eeb9fcbc5441fd4d7bc1ab4a527a
-
SHA512
cfeec157e42257c0e446de84f9660d37c636ad7c39d5d9d8bfe2b1bc88e33b4c18602e7abe2cade549ce7706a3d6592ba05ab6d0bd5d6ddc22884f0d7f17f8df
-
SSDEEP
3072:ss0Wj5goWC9Rdeouh3iCaNMikcWDfMtqmIrvOo/S/:sq5ge9Rdeo/N9U/D/S
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4764 QMAsEYMc.exe 5016 PikMYoEY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QMAsEYMc.exe = "C:\\Users\\Admin\\hkcwoIsc\\QMAsEYMc.exe" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PikMYoEY.exe = "C:\\ProgramData\\DikYcUos\\PikMYoEY.exe" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QMAsEYMc.exe = "C:\\Users\\Admin\\hkcwoIsc\\QMAsEYMc.exe" QMAsEYMc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PikMYoEY.exe = "C:\\ProgramData\\DikYcUos\\PikMYoEY.exe" PikMYoEY.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe QMAsEYMc.exe File created C:\Windows\SysWOW64\shell32.dll.exe QMAsEYMc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3900 reg.exe 3516 reg.exe 4568 reg.exe 644 reg.exe 4260 reg.exe 4388 reg.exe 4904 reg.exe 4520 reg.exe 4644 reg.exe 2272 reg.exe 3224 reg.exe 3952 reg.exe 4648 reg.exe 4720 reg.exe 4556 reg.exe 2108 reg.exe 5012 reg.exe 3672 reg.exe 3044 reg.exe 380 reg.exe 3628 reg.exe 4836 reg.exe 420 reg.exe 1828 reg.exe 2044 reg.exe 2444 reg.exe 4340 reg.exe 5012 reg.exe 3892 reg.exe 4392 reg.exe 3748 reg.exe 1524 reg.exe 552 reg.exe 4080 reg.exe 4948 reg.exe 4336 reg.exe 2092 reg.exe 440 reg.exe 4068 reg.exe 4232 reg.exe 2216 reg.exe 3944 reg.exe 3488 reg.exe 1284 reg.exe 4936 reg.exe 3556 reg.exe 1592 reg.exe 4372 reg.exe 4496 reg.exe 2456 reg.exe 4996 reg.exe 500 reg.exe 2176 reg.exe 1412 reg.exe 4568 reg.exe 4928 reg.exe 1096 reg.exe 4564 reg.exe 4720 reg.exe 2728 reg.exe 640 reg.exe 3988 reg.exe 4928 reg.exe 1044 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 940 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 940 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 940 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 940 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3068 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3068 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3068 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3068 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 1800 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 1800 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 1800 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 1800 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4268 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4268 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4268 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4268 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 4332 cmd.exe 4332 cmd.exe 4332 cmd.exe 4332 cmd.exe 220 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 220 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 220 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 220 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 2108 Conhost.exe 2108 Conhost.exe 2108 Conhost.exe 2108 Conhost.exe 3988 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3988 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3988 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3988 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 1424 Conhost.exe 1424 Conhost.exe 1424 Conhost.exe 1424 Conhost.exe 1984 Conhost.exe 1984 Conhost.exe 1984 Conhost.exe 1984 Conhost.exe 3492 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3492 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3492 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 3492 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 5060 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 5060 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 5060 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 5060 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 2332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 2332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 2332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 2332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4764 QMAsEYMc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe 4764 QMAsEYMc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4764 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 85 PID 4432 wrote to memory of 4764 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 85 PID 4432 wrote to memory of 4764 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 85 PID 4432 wrote to memory of 5016 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 86 PID 4432 wrote to memory of 5016 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 86 PID 4432 wrote to memory of 5016 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 86 PID 4432 wrote to memory of 3688 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 87 PID 4432 wrote to memory of 3688 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 87 PID 4432 wrote to memory of 3688 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 87 PID 4432 wrote to memory of 3224 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 89 PID 4432 wrote to memory of 3224 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 89 PID 4432 wrote to memory of 3224 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 89 PID 4432 wrote to memory of 404 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 91 PID 4432 wrote to memory of 404 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 91 PID 4432 wrote to memory of 404 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 91 PID 4432 wrote to memory of 380 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 90 PID 4432 wrote to memory of 380 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 90 PID 4432 wrote to memory of 380 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 90 PID 4432 wrote to memory of 3888 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 93 PID 4432 wrote to memory of 3888 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 93 PID 4432 wrote to memory of 3888 4432 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 93 PID 3688 wrote to memory of 3620 3688 cmd.exe 97 PID 3688 wrote to memory of 3620 3688 cmd.exe 97 PID 3688 wrote to memory of 3620 3688 cmd.exe 97 PID 3888 wrote to memory of 4932 3888 cmd.exe 98 PID 3888 wrote to memory of 4932 3888 cmd.exe 98 PID 3888 wrote to memory of 4932 3888 cmd.exe 98 PID 3620 wrote to memory of 3884 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 99 PID 3620 wrote to memory of 3884 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 99 PID 3620 wrote to memory of 3884 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 99 PID 3620 wrote to memory of 3944 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 101 PID 3620 wrote to memory of 3944 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 101 PID 3620 wrote to memory of 3944 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 101 PID 3620 wrote to memory of 1556 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 102 PID 3620 wrote to memory of 1556 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 102 PID 3620 wrote to memory of 1556 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 102 PID 3620 wrote to memory of 4836 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 103 PID 3620 wrote to memory of 4836 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 103 PID 3620 wrote to memory of 4836 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 103 PID 3620 wrote to memory of 3740 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 104 PID 3620 wrote to memory of 3740 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 104 PID 3620 wrote to memory of 3740 3620 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 104 PID 3884 wrote to memory of 4332 3884 cmd.exe 106 PID 3884 wrote to memory of 4332 3884 cmd.exe 106 PID 3884 wrote to memory of 4332 3884 cmd.exe 106 PID 4332 wrote to memory of 3412 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 110 PID 4332 wrote to memory of 3412 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 110 PID 4332 wrote to memory of 3412 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 110 PID 4332 wrote to memory of 756 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 112 PID 4332 wrote to memory of 756 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 112 PID 4332 wrote to memory of 756 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 112 PID 4332 wrote to memory of 500 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 115 PID 4332 wrote to memory of 500 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 115 PID 4332 wrote to memory of 500 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 115 PID 4332 wrote to memory of 420 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 114 PID 4332 wrote to memory of 420 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 114 PID 4332 wrote to memory of 420 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 114 PID 4332 wrote to memory of 3716 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 113 PID 4332 wrote to memory of 3716 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 113 PID 4332 wrote to memory of 3716 4332 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe 113 PID 3740 wrote to memory of 5036 3740 cmd.exe 120 PID 3740 wrote to memory of 5036 3740 cmd.exe 120 PID 3740 wrote to memory of 5036 3740 cmd.exe 120 PID 3412 wrote to memory of 940 3412 cmd.exe 121 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\hkcwoIsc\QMAsEYMc.exe"C:\Users\Admin\hkcwoIsc\QMAsEYMc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4764
-
-
C:\ProgramData\DikYcUos\PikMYoEY.exe"C:\ProgramData\DikYcUos\PikMYoEY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"8⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"10⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"12⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"14⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC15⤵PID:4332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"16⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"18⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC19⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"20⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"22⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC23⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"24⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC25⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"26⤵
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"28⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"30⤵PID:1680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"32⤵PID:4788
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC33⤵PID:3448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"34⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC35⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"36⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC37⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"38⤵PID:4960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵
- UAC bypass
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC39⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"40⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC41⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"42⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC43⤵PID:3856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"44⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC45⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"46⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC47⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"48⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC49⤵PID:3832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"50⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC51⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"52⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC53⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"54⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC55⤵PID:4768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"56⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC57⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"58⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC59⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"60⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC61⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"62⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC63⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"64⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC65⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"66⤵
- UAC bypass
- System policy modification
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC67⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"68⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC69⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"70⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC71⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"72⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC73⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"74⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC75⤵PID:2028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"76⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC77⤵
- System policy modification
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"78⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC79⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"80⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC81⤵PID:4384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"82⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC83⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"84⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC85⤵PID:640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"86⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC87⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"88⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC89⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"90⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC91⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"92⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC93⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"94⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC95⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"96⤵PID:4152
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC97⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"98⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC99⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"100⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC101⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"102⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC103⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"104⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC105⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"106⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC107⤵PID:460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"108⤵PID:1108
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵
- UAC bypass
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC109⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"110⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC111⤵PID:848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"112⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC113⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"114⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC115⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"116⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC117⤵PID:3416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"118⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC119⤵PID:3832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"120⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC121⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\82f5e411ef65e9be31d9cbeb2589e679_virlock_JC"122⤵PID:3508
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-