Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2023 15:16
Static task
static1
Behavioral task
behavioral1
Sample
99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe
-
Size
246KB
-
MD5
99df8d33b5994eafb5091985cb179bf8
-
SHA1
a8a0d1c03615a621bb7517ea8b3f6a2aa92cef5f
-
SHA256
ea1d0d59f1bdf4934d7e7cca759f25bebdfd26b4641e554066399e1dae9a0967
-
SHA512
574f175b472a7a6aeaf0582cf067dc449d7fabd5ba8e90677cbbf01e18e559168cfee18cbaadac3b3b8ab51e3e7b5b809ec7cc83cfa42eb083420e7de3f11fec
-
SSDEEP
6144:rbVh8tzlcrBZzgL/qK6wQoQLbguqsRJGjJ683v9r5txu:r5ycdZrJGjJ68f9nxu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2408 YWAAssQk.exe 1504 cOUUEMUA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YWAAssQk.exe = "C:\\Users\\Admin\\gUQUUQEo\\YWAAssQk.exe" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cOUUEMUA.exe = "C:\\ProgramData\\oEEQIYoA\\cOUUEMUA.exe" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YWAAssQk.exe = "C:\\Users\\Admin\\gUQUUQEo\\YWAAssQk.exe" YWAAssQk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cOUUEMUA.exe = "C:\\ProgramData\\oEEQIYoA\\cOUUEMUA.exe" cOUUEMUA.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe YWAAssQk.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe YWAAssQk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1592 reg.exe 2544 reg.exe 5024 reg.exe 3460 reg.exe 1808 reg.exe 2200 reg.exe 1128 reg.exe 464 reg.exe 4696 reg.exe 4692 reg.exe 2076 Process not Found 1604 reg.exe 2036 reg.exe 2132 Process not Found 3452 Process not Found 4360 reg.exe 5100 reg.exe 4984 reg.exe 2076 reg.exe 4800 reg.exe 2120 Process not Found 1892 reg.exe 5008 reg.exe 1212 reg.exe 1092 reg.exe 1564 reg.exe 1584 reg.exe 4752 reg.exe 4172 reg.exe 4596 reg.exe 5040 reg.exe 3564 reg.exe 4984 reg.exe 3040 reg.exe 552 reg.exe 4440 reg.exe 4788 reg.exe 4032 reg.exe 368 reg.exe 1972 reg.exe 380 reg.exe 3476 reg.exe 3992 reg.exe 4264 reg.exe 1516 reg.exe 3684 reg.exe 4444 reg.exe 4896 reg.exe 3264 reg.exe 4500 Process not Found 4964 reg.exe 800 reg.exe 4224 reg.exe 2304 reg.exe 1280 reg.exe 5024 reg.exe 1144 Process not Found 2304 reg.exe 5020 reg.exe 4904 reg.exe 4968 reg.exe 1120 reg.exe 1096 reg.exe 5100 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4812 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4812 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4812 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4812 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1924 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1924 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1924 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1924 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3636 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3636 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3636 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3636 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3564 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3564 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3564 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 3564 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2084 Conhost.exe 2084 Conhost.exe 2084 Conhost.exe 2084 Conhost.exe 1344 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1344 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1344 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1344 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2204 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2204 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2204 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2204 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1016 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1016 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1016 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1016 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4424 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4424 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4424 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4424 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4908 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4908 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4908 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4908 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4972 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4972 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4972 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 4972 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2136 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2136 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2136 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 2136 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1604 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1604 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1604 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 1604 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2408 YWAAssQk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe 2408 YWAAssQk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4948 wrote to memory of 2408 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 82 PID 4948 wrote to memory of 2408 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 82 PID 4948 wrote to memory of 2408 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 82 PID 4948 wrote to memory of 1504 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 83 PID 4948 wrote to memory of 1504 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 83 PID 4948 wrote to memory of 1504 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 83 PID 4948 wrote to memory of 4016 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 86 PID 4948 wrote to memory of 4016 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 86 PID 4948 wrote to memory of 4016 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 86 PID 4016 wrote to memory of 3588 4016 cmd.exe 85 PID 4016 wrote to memory of 3588 4016 cmd.exe 85 PID 4016 wrote to memory of 3588 4016 cmd.exe 85 PID 4948 wrote to memory of 4908 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 87 PID 4948 wrote to memory of 4908 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 87 PID 4948 wrote to memory of 4908 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 87 PID 4948 wrote to memory of 4232 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 94 PID 4948 wrote to memory of 4232 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 94 PID 4948 wrote to memory of 4232 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 94 PID 4948 wrote to memory of 2084 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 93 PID 4948 wrote to memory of 2084 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 93 PID 4948 wrote to memory of 2084 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 93 PID 4948 wrote to memory of 4688 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 92 PID 4948 wrote to memory of 4688 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 92 PID 4948 wrote to memory of 4688 4948 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 92 PID 3588 wrote to memory of 3668 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 95 PID 3588 wrote to memory of 3668 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 95 PID 3588 wrote to memory of 3668 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 95 PID 4688 wrote to memory of 3272 4688 cmd.exe 97 PID 4688 wrote to memory of 3272 4688 cmd.exe 97 PID 4688 wrote to memory of 3272 4688 cmd.exe 97 PID 3668 wrote to memory of 644 3668 cmd.exe 98 PID 3668 wrote to memory of 644 3668 cmd.exe 98 PID 3668 wrote to memory of 644 3668 cmd.exe 98 PID 3588 wrote to memory of 2164 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 99 PID 3588 wrote to memory of 2164 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 99 PID 3588 wrote to memory of 2164 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 99 PID 3588 wrote to memory of 3804 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 106 PID 3588 wrote to memory of 3804 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 106 PID 3588 wrote to memory of 3804 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 106 PID 3588 wrote to memory of 2224 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 100 PID 3588 wrote to memory of 2224 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 100 PID 3588 wrote to memory of 2224 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 100 PID 3588 wrote to memory of 712 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 101 PID 3588 wrote to memory of 712 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 101 PID 3588 wrote to memory of 712 3588 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 101 PID 712 wrote to memory of 1084 712 cmd.exe 107 PID 712 wrote to memory of 1084 712 cmd.exe 107 PID 712 wrote to memory of 1084 712 cmd.exe 107 PID 644 wrote to memory of 540 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 108 PID 644 wrote to memory of 540 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 108 PID 644 wrote to memory of 540 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 108 PID 644 wrote to memory of 4276 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 110 PID 644 wrote to memory of 4276 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 110 PID 644 wrote to memory of 4276 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 110 PID 644 wrote to memory of 2252 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 111 PID 644 wrote to memory of 2252 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 111 PID 644 wrote to memory of 2252 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 111 PID 644 wrote to memory of 2384 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 117 PID 644 wrote to memory of 2384 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 117 PID 644 wrote to memory of 2384 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 117 PID 644 wrote to memory of 1328 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 116 PID 644 wrote to memory of 1328 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 116 PID 644 wrote to memory of 1328 644 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe 116 PID 540 wrote to memory of 4812 540 cmd.exe 118 -
System policy modification 1 TTPs 50 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\gUQUUQEo\YWAAssQk.exe"C:\Users\Admin\gUQUUQEo\YWAAssQk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2408
-
-
C:\ProgramData\oEEQIYoA\cOUUEMUA.exe"C:\ProgramData\oEEQIYoA\cOUUEMUA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:4016
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
- Modifies visibility of file extensions in Explorer
PID:4908
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kqMYEAwY.bat" "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵PID:2084
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:4232
-
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"6⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"8⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"10⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"12⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC13⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"14⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"16⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"18⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"20⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"22⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"24⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"26⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"28⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC29⤵
- UAC bypass
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"30⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC31⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"32⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC33⤵PID:2536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"34⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC35⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"36⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC37⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"38⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC39⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"40⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC41⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"42⤵PID:2560
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵
- Modifies visibility of file extensions in Explorer
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC43⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"44⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC45⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"46⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC47⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"48⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC49⤵PID:4900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"50⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC51⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"52⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC53⤵PID:1944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"54⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC55⤵PID:1072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"56⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC57⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"58⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC59⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"60⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC61⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"62⤵PID:908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC63⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"64⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC65⤵PID:2224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"66⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC67⤵PID:432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"68⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC69⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"70⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC71⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"72⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC73⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"74⤵PID:1072
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC75⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"76⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC77⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"78⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC79⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"80⤵
- System policy modification
PID:800 -
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC81⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"82⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC83⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"84⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC85⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"86⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC87⤵PID:3044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"88⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC89⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"90⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC91⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"92⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC93⤵PID:1248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"94⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC95⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"96⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC97⤵PID:1516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"98⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC99⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"100⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC101⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"102⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC103⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"104⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC105⤵
- System policy modification
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"106⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC107⤵PID:5096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"108⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC109⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"110⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC111⤵PID:1548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"112⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC113⤵PID:1808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"114⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC115⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"116⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC117⤵
- System policy modification
PID:2696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"118⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC119⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"120⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC121⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\99df8d33b5994eafb5091985cb179bf8_virlock_JC"122⤵PID:1212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-