Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
08-08-2023 18:28
Static task
static1
Behavioral task
behavioral1
Sample
a1381cbf517d00754f60747a12d641ff_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a1381cbf517d00754f60747a12d641ff_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
a1381cbf517d00754f60747a12d641ff_virlock_JC.exe
-
Size
197KB
-
MD5
a1381cbf517d00754f60747a12d641ff
-
SHA1
0c647768cbb9cb39005fe5f1806ea478bde194f4
-
SHA256
e1a02bdd8046168f5d59f92067e3a74329b5981b4e614ce9f12556c00abb56d3
-
SHA512
f05134865a13618191403307fae99254278cb387391e6bcfd4c5a2d2cdbd0bc9da9dcd5b5790fbcdfd4e9ac278e53e445d21afcb8769835024153f0153497bf5
-
SSDEEP
3072:v1IE4QQEQUAhQEZvaeAyyyUmmaCu0fqr9UMI0LhLgzJT3FivB4Z5tPeiNCK2Wt+e:dIE493UAhMVmKmiAKLynVEC+R1hNUe
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe -
Executes dropped EXE 2 IoCs
pid Process 2148 CSggEkAA.exe 2816 JgEIcgsU.exe -
Loads dropped DLL 20 IoCs
pid Process 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\CSggEkAA.exe = "C:\\Users\\Admin\\EkMUYUMY\\CSggEkAA.exe" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JgEIcgsU.exe = "C:\\ProgramData\\rcYIkEQg\\JgEIcgsU.exe" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1024678951-1535676557-2778719785-1000\Software\Microsoft\Windows\CurrentVersion\Run\CSggEkAA.exe = "C:\\Users\\Admin\\EkMUYUMY\\CSggEkAA.exe" CSggEkAA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JgEIcgsU.exe = "C:\\ProgramData\\rcYIkEQg\\JgEIcgsU.exe" JgEIcgsU.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico CSggEkAA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1728 reg.exe 1780 reg.exe 2156 reg.exe 1924 reg.exe 1168 reg.exe 2588 reg.exe 2984 reg.exe 832 reg.exe 2748 reg.exe 904 reg.exe 2764 reg.exe 2644 reg.exe 2872 reg.exe 3036 reg.exe 2004 reg.exe 332 reg.exe 1096 reg.exe 2772 reg.exe 1352 reg.exe 1808 reg.exe 2316 reg.exe 872 reg.exe 2584 reg.exe 564 reg.exe 2408 reg.exe 2788 reg.exe 1696 reg.exe 520 reg.exe 2268 reg.exe 2236 reg.exe 2300 reg.exe 584 reg.exe 2192 reg.exe 2800 reg.exe 756 reg.exe 1464 reg.exe 2632 reg.exe 856 reg.exe 772 reg.exe 868 reg.exe 1728 reg.exe 440 reg.exe 1132 reg.exe 1904 reg.exe 2060 reg.exe 2736 reg.exe 2056 reg.exe 1944 reg.exe 708 reg.exe 1424 reg.exe 2548 reg.exe 1996 reg.exe 564 reg.exe 996 reg.exe 2268 reg.exe 2724 reg.exe 2612 reg.exe 1876 reg.exe 2156 reg.exe 2660 reg.exe 1828 reg.exe 1608 reg.exe 1912 reg.exe 308 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1468 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1468 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2028 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2028 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2560 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2560 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1944 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1944 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 876 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 876 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2880 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2880 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1708 Process not Found 1708 Process not Found 2920 cmd.exe 2920 cmd.exe 440 reg.exe 440 reg.exe 1740 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1740 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2172 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2172 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3020 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3020 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2880 conhost.exe 2880 conhost.exe 340 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 340 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1908 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1908 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 996 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 996 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2384 Process not Found 2384 Process not Found 2032 reg.exe 2032 reg.exe 3020 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3020 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2144 conhost.exe 2144 conhost.exe 640 cscript.exe 640 cscript.exe 1980 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 1980 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3032 cscript.exe 3032 cscript.exe 3060 conhost.exe 3060 conhost.exe 3036 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 3036 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2756 cmd.exe 2756 cmd.exe 2124 conhost.exe 2124 conhost.exe 2380 reg.exe 2380 reg.exe 1428 conhost.exe 1428 conhost.exe 2844 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 2844 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2148 CSggEkAA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe 2148 CSggEkAA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2148 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 28 PID 1900 wrote to memory of 2148 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 28 PID 1900 wrote to memory of 2148 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 28 PID 1900 wrote to memory of 2148 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 28 PID 1900 wrote to memory of 2816 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 29 PID 1900 wrote to memory of 2816 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 29 PID 1900 wrote to memory of 2816 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 29 PID 1900 wrote to memory of 2816 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 29 PID 1900 wrote to memory of 2812 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 30 PID 1900 wrote to memory of 2812 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 30 PID 1900 wrote to memory of 2812 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 30 PID 1900 wrote to memory of 2812 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 30 PID 1900 wrote to memory of 3048 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 32 PID 1900 wrote to memory of 3048 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 32 PID 1900 wrote to memory of 3048 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 32 PID 1900 wrote to memory of 3048 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 32 PID 2812 wrote to memory of 3000 2812 cmd.exe 34 PID 2812 wrote to memory of 3000 2812 cmd.exe 34 PID 2812 wrote to memory of 3000 2812 cmd.exe 34 PID 2812 wrote to memory of 3000 2812 cmd.exe 34 PID 1900 wrote to memory of 2736 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 33 PID 1900 wrote to memory of 2736 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 33 PID 1900 wrote to memory of 2736 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 33 PID 1900 wrote to memory of 2736 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 33 PID 1900 wrote to memory of 2156 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 35 PID 1900 wrote to memory of 2156 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 35 PID 1900 wrote to memory of 2156 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 35 PID 1900 wrote to memory of 2156 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 35 PID 1900 wrote to memory of 2764 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 40 PID 1900 wrote to memory of 2764 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 40 PID 1900 wrote to memory of 2764 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 40 PID 1900 wrote to memory of 2764 1900 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 40 PID 2764 wrote to memory of 528 2764 cmd.exe 41 PID 2764 wrote to memory of 528 2764 cmd.exe 41 PID 2764 wrote to memory of 528 2764 cmd.exe 41 PID 2764 wrote to memory of 528 2764 cmd.exe 41 PID 3000 wrote to memory of 1112 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 42 PID 3000 wrote to memory of 1112 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 42 PID 3000 wrote to memory of 1112 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 42 PID 3000 wrote to memory of 1112 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 42 PID 1112 wrote to memory of 1468 1112 cmd.exe 44 PID 1112 wrote to memory of 1468 1112 cmd.exe 44 PID 1112 wrote to memory of 1468 1112 cmd.exe 44 PID 1112 wrote to memory of 1468 1112 cmd.exe 44 PID 3000 wrote to memory of 1760 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 52 PID 3000 wrote to memory of 1760 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 52 PID 3000 wrote to memory of 1760 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 52 PID 3000 wrote to memory of 1760 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 52 PID 3000 wrote to memory of 1164 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 51 PID 3000 wrote to memory of 1164 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 51 PID 3000 wrote to memory of 1164 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 51 PID 3000 wrote to memory of 1164 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 51 PID 3000 wrote to memory of 568 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 48 PID 3000 wrote to memory of 568 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 48 PID 3000 wrote to memory of 568 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 48 PID 3000 wrote to memory of 568 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 48 PID 3000 wrote to memory of 2956 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 47 PID 3000 wrote to memory of 2956 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 47 PID 3000 wrote to memory of 2956 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 47 PID 3000 wrote to memory of 2956 3000 a1381cbf517d00754f60747a12d641ff_virlock_JC.exe 47 PID 2956 wrote to memory of 1996 2956 cmd.exe 53 PID 2956 wrote to memory of 1996 2956 cmd.exe 53 PID 2956 wrote to memory of 1996 2956 cmd.exe 53 PID 2956 wrote to memory of 1996 2956 cmd.exe 53 -
System policy modification 1 TTPs 48 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" a1381cbf517d00754f60747a12d641ff_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\EkMUYUMY\CSggEkAA.exe"C:\Users\Admin\EkMUYUMY\CSggEkAA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2148
-
-
C:\ProgramData\rcYIkEQg\JgEIcgsU.exe"C:\ProgramData\rcYIkEQg\JgEIcgsU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2816
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"6⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"8⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"10⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"12⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC13⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"14⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC15⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"16⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC17⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"18⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC19⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"20⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC21⤵PID:440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"22⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"24⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"26⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC27⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"28⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"30⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC31⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"32⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"34⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC35⤵PID:996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"36⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC37⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"38⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC39⤵PID:2032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"40⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC41⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"42⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC43⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"44⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC45⤵PID:640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"46⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"48⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC49⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"50⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC51⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"52⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC53⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"54⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC55⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"56⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC57⤵PID:2124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"58⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC59⤵PID:2380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"60⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC61⤵PID:1428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"62⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"64⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC65⤵PID:2412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"66⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC67⤵PID:1996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"68⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC69⤵PID:1140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"70⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC71⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"72⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC73⤵
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"74⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC75⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"76⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC77⤵PID:1808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"78⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC79⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"80⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC81⤵
- Modifies visibility of file extensions in Explorer
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"82⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC83⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"84⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC85⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"86⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC87⤵PID:980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"88⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC89⤵PID:1112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"90⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC91⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"92⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC93⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"94⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC95⤵PID:1492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"96⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC97⤵
- UAC bypass
- System policy modification
PID:2532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"98⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC99⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"100⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC101⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"102⤵
- Modifies visibility of file extensions in Explorer
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC103⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"104⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC105⤵PID:1492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"106⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC107⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"108⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC109⤵PID:1288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"110⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC111⤵
- UAC bypass
- System policy modification
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"112⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC113⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"114⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC115⤵PID:1876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"116⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC117⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"118⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC119⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"120⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC121⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a1381cbf517d00754f60747a12d641ff_virlock_JC"122⤵PID:588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-