File name:

2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock

Full analysis: https://app.any.run/tasks/6eb9845c-c0f2-4e11-b371-d0c4ef85fc08
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: December 27, 2024, 11:53:08
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
virlock
ransomware
stealer
nsb
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 2 sections
MD5:

79E148B914CC2CFDF7A52B7841F35FD7

SHA1:

3BE265DB312BE3F74BD59918B06781EAAFC75B0F

SHA256:

59F60EDF22186C9145B9BC6336D1EE91FC0927310FE0A7C9794BCCE61A240BE9

SSDEEP:

3072:OKPW9OpHyLLx0sFrte2FsJJ9JAWJZGH0WG7ob9XTaPyeQ055ypSS8:OsW92yLLx0Ie2sJ80WG7oxuC0vy8r

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • VIRLOCK mutex has been found

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 3816)
      • SwoYcckM.exe (PID: 4628)
      • XWAQAQUE.exe (PID: 4308)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4076)
    • Changes the autorun value in the registry

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
    • Uses sleep, probably for evasion detection (SCRIPT)

      • cscript.exe (PID: 3848)
    • Connects to the CnC server

      • SwoYcckM.exe (PID: 4628)
      • XWAQAQUE.exe (PID: 4308)
    • NSB has been detected (SURICATA)

      • SwoYcckM.exe (PID: 4628)
      • XWAQAQUE.exe (PID: 4308)
    • Actions looks like stealing of personal data

      • SwoYcckM.exe (PID: 4628)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 3816)
    • The process executes VB scripts

      • cmd.exe (PID: 3544)
    • Executable content was dropped or overwritten

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • SwoYcckM.exe (PID: 4628)
    • Uses REG/REGEDIT.EXE to modify registry

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 3816)
    • Executing commands from a ".bat" file

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
    • Connects to unusual port

      • SwoYcckM.exe (PID: 4628)
      • XWAQAQUE.exe (PID: 4308)
    • The process checks if it is being run in the virtual environment

      • SwoYcckM.exe (PID: 4628)
  • INFO

    • Checks supported languages

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 3816)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4076)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • SwoYcckM.exe (PID: 4628)
      • XWAQAQUE.exe (PID: 4308)
    • Creates files in the program directory

      • XWAQAQUE.exe (PID: 4308)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
    • Create files in a temporary directory

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 3816)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4076)
    • Reads the computer name

      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4160)
      • 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe (PID: 4076)
    • Reads security settings of Internet Explorer

      • cscript.exe (PID: 3848)
    • Process checks computer location settings

      • SwoYcckM.exe (PID: 4628)
    • Drops encrypted VBS script (Microsoft Script Encoder)

      • SwoYcckM.exe (PID: 4628)
    • Creates files or folders in the user directory

      • SwoYcckM.exe (PID: 4628)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1970:01:01 00:02:03+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5.12
CodeSize: 197120
InitializedDataSize: 4608
UninitializedDataSize: -
EntryPoint: 0x2db6d
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
2 401
Monitored processes
23
Malicious processes
14
Suspicious processes
3

Behavior graph

Click at the process to see the details
start #VIRLOCK 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe #VIRLOCK swoycckm.exe #VIRLOCK xwaqaque.exe cmd.exe no specs conhost.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs #VIRLOCK 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe no specs reg.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs conhost.exe no specs cscript.exe no specs cmd.exe no specs conhost.exe no specs #VIRLOCK 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe no specs reg.exe no specs reg.exe no specs conhost.exe no specs reg.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1356reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /fC:\Windows\SysWOW64\reg.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1472\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2088C:\WINDOWS\system32\cmd.exe /c "C:\Users\admin\Desktop\2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock"C:\Windows\SysWOW64\cmd.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2100C:\WINDOWS\system32\cmd.exe /c "C:\Users\admin\Desktop\2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock"C:\Windows\SysWOW64\cmd.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2456reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2C:\Windows\SysWOW64\reg.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2928\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3188reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /fC:\Windows\SysWOW64\reg.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3280reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1C:\Windows\SysWOW64\reg.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3544C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\UOIwksQQ.bat" "C:\Users\admin\Desktop\2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe""C:\Windows\SysWOW64\cmd.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3620reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2C:\Windows\SysWOW64\reg.exe2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Registry Console Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 048
Read events
2 044
Write events
4
Delete events
0

Modification events

(PID) Process:(4160) 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:SwoYcckM.exe
Value:
C:\Users\admin\lEMYkwoU\SwoYcckM.exe
(PID) Process:(4160) 2024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:XWAQAQUE.exe
Value:
C:\ProgramData\usAgAgoI\XWAQAQUE.exe
(PID) Process:(4628) SwoYcckM.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:SwoYcckM.exe
Value:
C:\Users\admin\lEMYkwoU\SwoYcckM.exe
(PID) Process:(4308) XWAQAQUE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:XWAQAQUE.exe
Value:
C:\ProgramData\usAgAgoI\XWAQAQUE.exe
Executable files
498
Suspicious files
0
Text files
141
Unknown types
0

Dropped files

PID
Process
Filename
Type
41602024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\lEMYkwoU\SwoYcckM.exeexecutable
MD5:C618FF251F30A9C8673AA4924DB0A9DA
SHA256:D63F68E3A28811243D966AF864F2EFAB3AFA1008A3D44A0BB02933A840B3C59B
41602024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\ProgramData\usAgAgoI\XWAQAQUE.exeexecutable
MD5:FE5FD0DF2DA43653412E83A02B0BF18C
SHA256:590DFABC3A326FE034769B815A45AD2C943A40C73BB28E992DE21AA49B3CD8DE
4628SwoYcckM.exeC:\Users\admin\lEMYkwoU\SwoYcckM.inftext
MD5:6DA530EA584F82243B302F86DFEA9CC5
SHA256:8AE47C5CC894D9EB548767A858EFA62DE89AAE0E5B8BD75CEFA10B34C4898AF2
41602024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\AppData\Local\Temp\UOIwksQQ.battext
MD5:BAE1095F340720D965898063FEDE1273
SHA256:EE5E0A414167C2ACA961A616274767C4295659517A814D1428248BD53C6E829A
4308XWAQAQUE.exeC:\ProgramData\usAgAgoI\XWAQAQUE.inftext
MD5:6DA530EA584F82243B302F86DFEA9CC5
SHA256:8AE47C5CC894D9EB548767A858EFA62DE89AAE0E5B8BD75CEFA10B34C4898AF2
38162024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\AppData\Local\Temp\vUgwksQQ.battext
MD5:09500800DBF755C5CC4959BB85475A5B
SHA256:15FA1BA30ED5A8195F732B3CE73F265BF2E6908A83A688BF5CEFE2BEE335EA76
38162024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\AppData\Local\Temp\BsswksQQ.battext
MD5:BAE1095F340720D965898063FEDE1273
SHA256:EE5E0A414167C2ACA961A616274767C4295659517A814D1428248BD53C6E829A
40762024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\AppData\Local\Temp\WmUEAYco.battext
MD5:CC76DA4BAACBB57CD0BF09C997214523
SHA256:9AD3A1146E1F9E89B57CBCD41DAF4DBF5EB847D46695D360E2475FBD7E71688B
40762024-12-27_79e148b914cc2cfdf7a52b7841f35fd7_virlock.exeC:\Users\admin\AppData\Local\Temp\wwkEAYco.battext
MD5:BAE1095F340720D965898063FEDE1273
SHA256:EE5E0A414167C2ACA961A616274767C4295659517A814D1428248BD53C6E829A
4628SwoYcckM.exeC:\Users\admin\Desktop\zIAy.icoimage
MD5:8C44504BC8ECFA4C2D02F7668870EA6F
SHA256:C327C0485909F634C456CEA42F7DB6353FA4942EFE43A2C336D3932784C927ED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
27
DNS requests
7
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4308
XWAQAQUE.exe
GET
301
142.250.185.142:80
http://google.com/
unknown
whitelisted
4628
SwoYcckM.exe
GET
301
142.250.185.142:80
http://google.com/
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
88.221.169.152:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
192.168.100.255:137
whitelisted
2.23.209.156:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
4628
SwoYcckM.exe
200.87.164.69:9999
Entel S.A. - EntelNet
BO
unknown
4308
XWAQAQUE.exe
200.87.164.69:9999
Entel S.A. - EntelNet
BO
unknown
4628
SwoYcckM.exe
142.250.185.142:80
google.com
GOOGLE
US
whitelisted
4308
XWAQAQUE.exe
142.250.185.142:80
google.com
GOOGLE
US
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.120:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
5732
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
www.bing.com
  • 2.23.209.156
  • 2.23.209.182
  • 2.23.209.150
  • 2.23.209.179
  • 2.23.209.181
  • 2.23.209.158
  • 2.23.209.176
  • 2.23.209.183
  • 2.23.209.177
whitelisted
google.com
  • 142.250.185.142
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 88.221.169.152
whitelisted
self.events.data.microsoft.com
  • 51.116.253.170
whitelisted

Threats

PID
Process
Class
Message
4308
XWAQAQUE.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
4628
SwoYcckM.exe
A Network Trojan was detected
ET HUNTING Terse Unencrypted Request for Google - Likely Connectivity Check
4628
SwoYcckM.exe
Potentially Bad Traffic
ET HUNTING SUSPICIOUS Possible automated connectivity check (www.google.com)
4628
SwoYcckM.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] NSB Virlock.Gen Check-in
4308
XWAQAQUE.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] NSB Virlock.Gen Check-in
4628
SwoYcckM.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] NSB Virlock.Gen Check-in
4628
SwoYcckM.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] NSB Virlock.Gen Check-in
4308
XWAQAQUE.exe
A Network Trojan was detected
RANSOMWARE [ANY.RUN] NSB Virlock.Gen Check-in
No debug info