Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2023, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe
-
Size
203KB
-
MD5
9d3d901efd656fc8cee365a2f1ca34d0
-
SHA1
a13cc5be83a250fc852fa8bae3011e6ed6be3458
-
SHA256
e9f33cd4bdd542df884433d873157ad9903f3e45d80f0e476932444e2edf97c9
-
SHA512
8bbac5cb420956e14d34cbc74cc38f1a512e0f1980830192acfd6ed390d29637d45931ef65d52d6a2c0daaabffdd73fc2c4f2eb3f1d6a7661838db1f4aa529fe
-
SSDEEP
3072:D2d5XM6CmZVUvSajsMBdbTSZ0U3ouKGYEVEeBP15fmXnYmPp8bjBp:4a6NVXAdb2ZUUOSP7mXh2bjBp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" usIcQoMs.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WerFault.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" WerFault.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 3312 GaEQcwMQ.exe 812 TsQgUMow.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GaEQcwMQ.exe = "C:\\Users\\Admin\\NMosUkEA\\GaEQcwMQ.exe" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TsQgUMow.exe = "C:\\ProgramData\\CKYsEEoo\\TsQgUMow.exe" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GaEQcwMQ.exe = "C:\\Users\\Admin\\NMosUkEA\\GaEQcwMQ.exe" GaEQcwMQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TsQgUMow.exe = "C:\\ProgramData\\CKYsEEoo\\TsQgUMow.exe" TsQgUMow.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\usIcQoMs.exe = "C:\\Users\\Admin\\omUEwckI\\usIcQoMs.exe" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sycoskgM.exe = "C:\\ProgramData\\UaYEAgks\\sycoskgM.exe" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe GaEQcwMQ.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe GaEQcwMQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3556 2000 WerFault.exe 1136 1156 4476 WerFault.exe 1138 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2980 reg.exe 4888 reg.exe 2868 reg.exe 2292 reg.exe 2932 reg.exe 544 reg.exe 1932 reg.exe 544 reg.exe 676 reg.exe 1956 reg.exe 3448 reg.exe 2536 reg.exe 4720 reg.exe 4388 reg.exe 2292 reg.exe 2152 reg.exe 1004 reg.exe 3400 reg.exe 3120 reg.exe 1948 reg.exe 2828 reg.exe 4780 reg.exe 3352 reg.exe 4160 reg.exe 5036 reg.exe 3844 reg.exe 1900 reg.exe 2336 reg.exe 4776 reg.exe 1712 reg.exe 3044 reg.exe 5040 reg.exe 4352 reg.exe 2276 reg.exe 3872 reg.exe 4176 reg.exe 636 reg.exe 3400 reg.exe 2812 reg.exe 396 reg.exe 1308 reg.exe 680 reg.exe 4024 reg.exe 4688 reg.exe 5056 reg.exe 2980 reg.exe 5072 reg.exe 1152 reg.exe 1384 reg.exe 3920 reg.exe 3092 reg.exe 1948 reg.exe 4580 reg.exe 4244 reg.exe 4400 reg.exe 4752 reg.exe 4204 reg.exe 3980 reg.exe 2800 reg.exe 2072 reg.exe 1712 reg.exe 4284 reg.exe 2032 reg.exe 1888 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3228 reg.exe 3228 reg.exe 3228 reg.exe 3228 reg.exe 4456 reg.exe 4456 reg.exe 4456 reg.exe 4456 reg.exe 3004 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3004 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3004 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3004 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4584 Conhost.exe 4584 Conhost.exe 4584 Conhost.exe 4584 Conhost.exe 3968 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3968 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3968 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3968 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2768 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2768 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2768 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2768 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1096 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1096 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1096 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1096 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 3500 cscript.exe 3500 cscript.exe 3500 cscript.exe 3500 cscript.exe 2576 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2576 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2576 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 2576 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4752 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4752 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4752 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4752 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4788 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4788 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4788 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 4788 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1552 cmd.exe 1552 cmd.exe 1552 cmd.exe 1552 cmd.exe 1616 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1616 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1616 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 1616 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3312 GaEQcwMQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe 3312 GaEQcwMQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2628 wrote to memory of 3312 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 81 PID 2628 wrote to memory of 3312 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 81 PID 2628 wrote to memory of 3312 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 81 PID 2628 wrote to memory of 812 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 82 PID 2628 wrote to memory of 812 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 82 PID 2628 wrote to memory of 812 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 82 PID 2628 wrote to memory of 3772 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 83 PID 2628 wrote to memory of 3772 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 83 PID 2628 wrote to memory of 3772 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 83 PID 2628 wrote to memory of 264 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 92 PID 2628 wrote to memory of 264 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 92 PID 2628 wrote to memory of 264 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 92 PID 2628 wrote to memory of 1304 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 87 PID 2628 wrote to memory of 1304 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 87 PID 2628 wrote to memory of 1304 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 87 PID 2628 wrote to memory of 636 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 85 PID 2628 wrote to memory of 636 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 85 PID 2628 wrote to memory of 636 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 85 PID 2628 wrote to memory of 2076 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 86 PID 2628 wrote to memory of 2076 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 86 PID 2628 wrote to memory of 2076 2628 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 86 PID 3772 wrote to memory of 4756 3772 cmd.exe 93 PID 3772 wrote to memory of 4756 3772 cmd.exe 93 PID 3772 wrote to memory of 4756 3772 cmd.exe 93 PID 2076 wrote to memory of 1008 2076 cmd.exe 94 PID 2076 wrote to memory of 1008 2076 cmd.exe 94 PID 2076 wrote to memory of 1008 2076 cmd.exe 94 PID 4756 wrote to memory of 3716 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 95 PID 4756 wrote to memory of 3716 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 95 PID 4756 wrote to memory of 3716 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 95 PID 4756 wrote to memory of 3172 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 97 PID 4756 wrote to memory of 3172 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 97 PID 4756 wrote to memory of 3172 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 97 PID 4756 wrote to memory of 4212 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 98 PID 4756 wrote to memory of 4212 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 98 PID 4756 wrote to memory of 4212 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 98 PID 4756 wrote to memory of 1160 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 99 PID 4756 wrote to memory of 1160 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 99 PID 4756 wrote to memory of 1160 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 99 PID 4756 wrote to memory of 3316 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 100 PID 4756 wrote to memory of 3316 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 100 PID 4756 wrote to memory of 3316 4756 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 100 PID 3716 wrote to memory of 2272 3716 cmd.exe 105 PID 3716 wrote to memory of 2272 3716 cmd.exe 105 PID 3716 wrote to memory of 2272 3716 cmd.exe 105 PID 3316 wrote to memory of 1196 3316 cmd.exe 106 PID 3316 wrote to memory of 1196 3316 cmd.exe 106 PID 3316 wrote to memory of 1196 3316 cmd.exe 106 PID 2272 wrote to memory of 1132 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 108 PID 2272 wrote to memory of 1132 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 108 PID 2272 wrote to memory of 1132 2272 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe 108 PID 1132 wrote to memory of 3228 1132 cmd.exe 110 PID 1132 wrote to memory of 3228 1132 cmd.exe 110 PID 1132 wrote to memory of 3228 1132 cmd.exe 110 PID 2272 wrote to memory of 4328 2272 reg.exe 117 PID 2272 wrote to memory of 4328 2272 reg.exe 117 PID 2272 wrote to memory of 4328 2272 reg.exe 117 PID 2272 wrote to memory of 5096 2272 reg.exe 116 PID 2272 wrote to memory of 5096 2272 reg.exe 116 PID 2272 wrote to memory of 5096 2272 reg.exe 116 PID 2272 wrote to memory of 3536 2272 reg.exe 115 PID 2272 wrote to memory of 3536 2272 reg.exe 115 PID 2272 wrote to memory of 3536 2272 reg.exe 115 PID 2272 wrote to memory of 1800 2272 reg.exe 111 -
System policy modification 1 TTPs 26 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\NMosUkEA\GaEQcwMQ.exe"C:\Users\Admin\NMosUkEA\GaEQcwMQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3312
-
-
C:\ProgramData\CKYsEEoo\TsQgUMow.exe"C:\ProgramData\CKYsEEoo\TsQgUMow.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"6⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC7⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"8⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC9⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"10⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"12⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC13⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"14⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"16⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"18⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"20⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC21⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"22⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"24⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"26⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"28⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC29⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"30⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"32⤵
- System policy modification
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC33⤵PID:2052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"34⤵PID:4776
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC35⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"36⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC37⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"38⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC39⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"40⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC41⤵PID:4900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"42⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC43⤵PID:780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"44⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC45⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"46⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC47⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"48⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC49⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"50⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC51⤵PID:1852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"52⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC53⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"54⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC55⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"56⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC57⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"58⤵PID:912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵
- Modifies visibility of file extensions in Explorer
PID:676
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC59⤵PID:3324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"60⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC61⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"62⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC63⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"64⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC65⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"66⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC67⤵PID:2352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"68⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC69⤵PID:2752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"70⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC71⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"72⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC73⤵PID:2828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"74⤵PID:4368
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵
- UAC bypass
PID:5044
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC75⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"76⤵PID:3504
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4028
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC77⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"78⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC79⤵
- Modifies visibility of file extensions in Explorer
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"80⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC81⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"82⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC83⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"84⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC85⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"86⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC87⤵PID:2932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"88⤵PID:3640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:1468
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC89⤵PID:648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"90⤵PID:5016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC91⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"92⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC93⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"94⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC95⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"96⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC97⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"98⤵PID:2324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC99⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"100⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC101⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"102⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC103⤵PID:1428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"104⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC105⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"106⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC107⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"108⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC109⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"110⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC111⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"112⤵PID:3148
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3136
-
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC113⤵PID:3304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"114⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC115⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"116⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC117⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"118⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC119⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"120⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC121⤵PID:3112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\9d3d901efd656fc8cee365a2f1ca34d0_virlock_JC"122⤵PID:2936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-