Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe
-
Size
199KB
-
MD5
0cfe834c6ed3a8a1504a72442e897e14
-
SHA1
17dfea29a9824283f11c3a11c570595844ea4f59
-
SHA256
0a275934bb5f8a5cdb4f58d9f1eeeb93fece7220c7a2c6480583a45f7ef0525b
-
SHA512
11fe21f60ee966168f905c2da6e34f8f827d84230a3af52db364c9cd37417c4413b3dbb93145f967da65902b65825b9bbd3e3c10835d1248b3739dec25e95cb3
-
SSDEEP
3072:gcam+Kr1b98tM/pLWfZe//INDX89gksXAC6XaMEAzNm+caaXPf/SoRB:q7Kr1sM/S2Iq9gkjCmaMEbTX3qCB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4960 awYskEQE.exe 1080 tGwQAAEg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tGwQAAEg.exe = "C:\\ProgramData\\CocUQAIM\\tGwQAAEg.exe" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\awYskEQE.exe = "C:\\Users\\Admin\\kUQMkogI\\awYskEQE.exe" awYskEQE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\tGwQAAEg.exe = "C:\\ProgramData\\CocUQAIM\\tGwQAAEg.exe" tGwQAAEg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\awYskEQE.exe = "C:\\Users\\Admin\\kUQMkogI\\awYskEQE.exe" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe awYskEQE.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe awYskEQE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4488 reg.exe 3672 reg.exe 1324 reg.exe 3412 reg.exe 4276 reg.exe 3188 reg.exe 1092 reg.exe 2752 reg.exe 3820 reg.exe 2052 reg.exe 4552 reg.exe 4768 reg.exe 4828 reg.exe 3508 reg.exe 5080 reg.exe 4092 reg.exe 1480 reg.exe 3100 reg.exe 3380 reg.exe 500 reg.exe 404 reg.exe 2432 reg.exe 4772 reg.exe 1700 reg.exe 1836 reg.exe 2172 reg.exe 3132 reg.exe 1160 reg.exe 4924 reg.exe 2008 reg.exe 4436 reg.exe 2576 reg.exe 1116 reg.exe 216 reg.exe 4440 reg.exe 4212 reg.exe 3736 reg.exe 4772 reg.exe 352 reg.exe 3224 reg.exe 2972 reg.exe 3768 reg.exe 4920 reg.exe 4308 reg.exe 3632 reg.exe 3412 reg.exe 4772 reg.exe 4436 reg.exe 3024 reg.exe 4656 reg.exe 2768 reg.exe 532 reg.exe 1340 reg.exe 4308 reg.exe 4688 reg.exe 2456 reg.exe 3152 reg.exe 3448 reg.exe 4476 reg.exe 2308 reg.exe 5012 reg.exe 2692 reg.exe 2748 reg.exe 816 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 3804 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 3804 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 3804 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 3804 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2388 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2388 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2388 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2388 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1824 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1824 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1824 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1824 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2568 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2568 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2568 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2568 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2000 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2000 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2000 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2000 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1492 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1492 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1492 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1492 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4972 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4972 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4972 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4972 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4352 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4352 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4352 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 4352 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2816 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 416 mousocoreworker.exe 416 mousocoreworker.exe 416 mousocoreworker.exe 416 mousocoreworker.exe 2056 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2056 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2056 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 2056 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 1612 reg.exe 1612 reg.exe 1612 reg.exe 1612 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4960 awYskEQE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe 4960 awYskEQE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 4960 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 81 PID 2740 wrote to memory of 4960 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 81 PID 2740 wrote to memory of 4960 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 81 PID 2740 wrote to memory of 1080 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 83 PID 2740 wrote to memory of 1080 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 83 PID 2740 wrote to memory of 1080 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 83 PID 2740 wrote to memory of 5020 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 82 PID 2740 wrote to memory of 5020 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 82 PID 2740 wrote to memory of 5020 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 82 PID 2740 wrote to memory of 3828 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 84 PID 2740 wrote to memory of 3828 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 84 PID 2740 wrote to memory of 3828 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 84 PID 2740 wrote to memory of 2908 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 86 PID 2740 wrote to memory of 2908 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 86 PID 2740 wrote to memory of 2908 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 86 PID 2740 wrote to memory of 416 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 89 PID 2740 wrote to memory of 416 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 89 PID 2740 wrote to memory of 416 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 89 PID 2740 wrote to memory of 1140 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 87 PID 2740 wrote to memory of 1140 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 87 PID 2740 wrote to memory of 1140 2740 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 87 PID 5020 wrote to memory of 2216 5020 cmd.exe 93 PID 5020 wrote to memory of 2216 5020 cmd.exe 93 PID 5020 wrote to memory of 2216 5020 cmd.exe 93 PID 1140 wrote to memory of 1104 1140 cmd.exe 94 PID 1140 wrote to memory of 1104 1140 cmd.exe 94 PID 1140 wrote to memory of 1104 1140 cmd.exe 94 PID 2216 wrote to memory of 3792 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 95 PID 2216 wrote to memory of 3792 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 95 PID 2216 wrote to memory of 3792 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 95 PID 2216 wrote to memory of 1672 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 104 PID 2216 wrote to memory of 1672 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 104 PID 2216 wrote to memory of 1672 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 104 PID 2216 wrote to memory of 1988 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 103 PID 2216 wrote to memory of 1988 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 103 PID 2216 wrote to memory of 1988 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 103 PID 2216 wrote to memory of 1504 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 102 PID 2216 wrote to memory of 1504 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 102 PID 2216 wrote to memory of 1504 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 102 PID 2216 wrote to memory of 4552 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 97 PID 2216 wrote to memory of 4552 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 97 PID 2216 wrote to memory of 4552 2216 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 97 PID 3792 wrote to memory of 4488 3792 cmd.exe 106 PID 3792 wrote to memory of 4488 3792 cmd.exe 106 PID 3792 wrote to memory of 4488 3792 cmd.exe 106 PID 4552 wrote to memory of 928 4552 cmd.exe 107 PID 4552 wrote to memory of 928 4552 cmd.exe 107 PID 4552 wrote to memory of 928 4552 cmd.exe 107 PID 4488 wrote to memory of 4312 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 108 PID 4488 wrote to memory of 4312 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 108 PID 4488 wrote to memory of 4312 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 108 PID 4488 wrote to memory of 4828 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 113 PID 4488 wrote to memory of 4828 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 113 PID 4488 wrote to memory of 4828 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 113 PID 4488 wrote to memory of 5048 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 112 PID 4488 wrote to memory of 5048 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 112 PID 4488 wrote to memory of 5048 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 112 PID 4488 wrote to memory of 3412 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 111 PID 4488 wrote to memory of 3412 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 111 PID 4488 wrote to memory of 3412 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 111 PID 4488 wrote to memory of 1776 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 110 PID 4488 wrote to memory of 1776 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 110 PID 4488 wrote to memory of 1776 4488 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe 110 PID 1776 wrote to memory of 1144 1776 cmd.exe 119 -
System policy modification 1 TTPs 24 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\kUQMkogI\awYskEQE.exe"C:\Users\Admin\kUQMkogI\awYskEQE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"6⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"8⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"10⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"12⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC13⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"14⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"16⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"18⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"20⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"22⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"24⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"26⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC27⤵PID:416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"28⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"30⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC31⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"32⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC33⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"34⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC35⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"36⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC37⤵PID:564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"38⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC39⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"40⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC41⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"42⤵PID:4624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC43⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"44⤵PID:3392
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC45⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"46⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC47⤵PID:4552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"48⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC49⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"50⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC51⤵
- Modifies visibility of file extensions in Explorer
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"52⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC53⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"54⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC55⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"56⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC57⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"58⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC59⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"60⤵
- UAC bypass
- System policy modification
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC61⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"62⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC63⤵PID:568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"64⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC65⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"66⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC67⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"68⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC69⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"70⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC71⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"72⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC73⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"74⤵PID:3596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC75⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"76⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC77⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"78⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC79⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"80⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC81⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"82⤵PID:3340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC83⤵PID:848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"84⤵PID:1656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵
- Modifies visibility of file extensions in Explorer
PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC85⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"86⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC87⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"88⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC89⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"90⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC91⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"92⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC93⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"94⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC95⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"96⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC97⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"98⤵PID:4452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC99⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"100⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC101⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"102⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC103⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"104⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC105⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"106⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC107⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"108⤵
- System policy modification
PID:2808 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC109⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"110⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC111⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"112⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC113⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"114⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC115⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"116⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC117⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"118⤵PID:3024
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵
- Modifies visibility of file extensions in Explorer
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC119⤵PID:4540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"120⤵PID:3388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:3104
-
-
C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC121⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\0cfe834c6ed3a8a1504a72442e897e14_virlock_JC"122⤵PID:3548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-