Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WinLock.bin

Overview

General Information

Sample Name:WinLock.bin (renamed file extension from bin to exe)
Analysis ID:633960
MD5:5e5043a0455e8652d0a58c8611e47903
SHA1:8c277a2c32d211b5faa0dd65a8872c903e1ed429
SHA256:b25818cfa65b13e2be6358f5c28dfae35578d72fea8d0120486d8ec6629a1bf4
Tags:exeRansomwareRUScreenLock
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Creates an undocumented autostart registry key
Disables the Windows task manager (taskmgr)
Uses 32bit PE files
Changes image file execution options
Antivirus or Machine Learning detection for unpacked file
Hides icons from the desktop

Classification

  • System is w10x64
  • WinLock.exe (PID: 5636 cmdline: "C:\Users\user\Desktop\WinLock.exe" MD5: 5E5043A0455E8652D0A58C8611E47903)
  • explorer.exe (PID: 5784 cmdline: explorer.exe MD5: AD5296B280E8F522A8A897C96BAB0E1D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: WinLock.exeAvira: detected
Source: WinLock.exeJoe Sandbox ML: detected
Source: 0.0.WinLock.exe.400000.0.unpackAvira: Label: DR/Delphi.Gen
Source: WinLock.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: WinLock.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
Source: WinLock.exeStatic PE information: Section: UPX1 ZLIB complexity 0.992122882204
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\Borland\Delphi\4.0Jump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\Borland\Delphi\5.0Jump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\Borland\Delphi\6.0Jump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_LOCAL_MACHINE\Software\WOW6432Node\Borland\Delphi\7.0Jump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeFile written: C:\Users\user\Desktop\Time.iniJump to behavior
Source: classification engineClassification label: mal60.evad.winEXE@2/2@0/0
Source: unknownProcess created: C:\Users\user\Desktop\WinLock.exe "C:\Users\user\Desktop\WinLock.exe"
Source: unknownProcess created: C:\Windows\explorer.exe explorer.exe
Source: unknownProcess created: C:\Windows\explorer.exe
Source: C:\Users\user\Desktop\WinLock.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\WinLock.exeMutant created: \Sessions\1\BaseNamedObjects\lksjfhglkjfsdg131
Source: C:\Users\user\Desktop\WinLock.exeFile created: C:\Users\user\Desktop\Time.iniJump to behavior
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Boot Survival

barindex
Source: C:\Users\user\Desktop\WinLock.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe DebuggerJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explorer.exe DebuggerJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskmgr.exe DebuggerJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeRegistry key created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer NoDesktopJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinLock.exeProcess information queried: ProcessInformationJump to behavior

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\WinLock.exeRegistry key created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\system DisableTaskMgrJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management Instrumentation1
Registry Run Keys / Startup Folder
1
Process Injection
1
Masquerading
OS Credential Dumping1
Process Discovery
Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/Job1
Image File Execution Options Injection
1
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory2
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)1
Image File Execution Options Injection
21
Software Packing
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
WinLock.exe100%AviraW32/Induc.ciw
WinLock.exe100%Joe Sandbox ML
No Antivirus matches
SourceDetectionScannerLabelLinkDownload
0.0.WinLock.exe.400000.0.unpack100%AviraDR/Delphi.GenDownload File
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:34.0.0 Boulder Opal
Analysis ID:633960
Start date and time: 25/05/202212:16:072022-05-25 12:16:07 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 36s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:WinLock.bin (renamed file extension from bin to exe)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:25
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal60.evad.winEXE@2/2@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
  • Execution Graph export aborted for target WinLock.exe, PID 5636 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\WinLock.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):18
Entropy (8bit):3.3921472236645345
Encrypted:false
SSDEEP:3:zSn:zS
MD5:0E28E5A1D1A07BDF23D9A9C7EEC8F365
SHA1:293893C3C9AC12C410493180B7B0DD3CF359025F
SHA-256:BA469C29CE2BE61150FCC404AA05D29D47E66E85D70B50B89DB00D79DB63E9AC
SHA-512:DF729850229BD7370403972EB8FF50D0BA5BF49FD0C0972D2EA57C63300D45FDA7E63F7D500F1982D0CDEDCD39BE2C37F6E3CDD1F240C6D01A143DC699B68FA8
Malicious:false
Reputation:low
Preview:[Time]..Time=101..
Process:C:\Users\user\Desktop\WinLock.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):21
Entropy (8bit):3.6304126608739984
Encrypted:false
SSDEEP:3:XTzVsn:DzVs
MD5:A0368CBFFB159B4F62A8A9C9FEFC66B8
SHA1:B70134A786195E48BC1B065D68E898F180631E7E
SHA-256:77E5260759F88CCC1A8D4C72FC7B6636497CD7140D81B55579FF010D7E0B4854
SHA-512:5582DE2614BF4EA5B512B7DB2DB0908FFF8788252884E6A566D36EB1FB091C65551F52FD834ECDB7A9BEF9C87ACE76B78D6FF24D3FBF7357A63FE09B48252DF1
Malicious:false
Reputation:low
Preview:[Time2]..Time2=3500..
File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.905186421158123
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.63%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:WinLock.exe
File size:492544
MD5:5e5043a0455e8652d0a58c8611e47903
SHA1:8c277a2c32d211b5faa0dd65a8872c903e1ed429
SHA256:b25818cfa65b13e2be6358f5c28dfae35578d72fea8d0120486d8ec6629a1bf4
SHA512:f694e0ac611ce214bb8615f7453933cdb94cf83d220bb0c42896f88289506e0cd281d5a51f91c15c09a67a2fcaa607f4ee1e6420bdd94bb12dbfe954955ce719
SSDEEP:12288:Lp/PKhWltltmVU/BvHLts2kBrHVJ0cjdUMBsXj95RN:EhWlPtr/BvHJsLHiYBsXj9nN
TLSH:9FA42383F743BD13C526AEF11291C7149F1048F91A9A7FBB9E1DF85ABAFE4025940352
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:b24dc6030fcc4db2
Entrypoint:0x552f60
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, BYTES_REVERSED_LO, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, BYTES_REVERSED_HI, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:32a3b7658be85c7c43fe36e3e5b0f5a3
Instruction
pushad
mov esi, 004DE000h
lea edi, dword ptr [esi-000DD000h]
mov dword ptr [edi+0011A0A0h], 20FD7E2Ch
push edi
or ebp, FFFFFFFFh
jmp 00007F1790947D70h
nop
nop
nop
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F1790947D4Fh
mov eax, 00000001h
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007F1790947D6Dh
jne 00007F1790947D8Ah
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F1790947D81h
dec eax
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
jmp 00007F1790947D36h
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jmp 00007F1790947DB4h
xor ecx, ecx
sub eax, 03h
jc 00007F1790947D73h
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007F1790947DD7h
sar eax, 1
mov ebp, eax
jmp 00007F1790947D6Dh
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F1790947D2Eh
inc ecx
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F1790947D20h
add ebx, ebx
jne 00007F1790947D69h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007F1790947D51h
jne 00007F1790947D6Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F1790947D46h
add ecx, 02h
cmp ebp, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x156ad80x2a4.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1540000x2ad8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1531180x18UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000xdd0000x0False0empty0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
UPX10xde0000x760000x75200False0.992122882204data7.92981825597IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x1540000x30000x2e00False0.279466711957data4.48965207385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_CURSOR0x1365f00x134dataEnglishUnited States
RT_CURSOR0x1367240x134data
RT_CURSOR0x1368580x134data
RT_CURSOR0x13698c0x134data
RT_CURSOR0x136ac00x134data
RT_CURSOR0x136bf40x134data
RT_CURSOR0x136d280x134data
RT_CURSOR0x136e5c0x134data
RT_BITMAP0x136f900x1d0data
RT_BITMAP0x1371600x1e4data
RT_BITMAP0x1373440x1d0data
RT_BITMAP0x1375140x1d0data
RT_BITMAP0x1376e40x1d0data
RT_BITMAP0x1378b40x1d0data
RT_BITMAP0x137a840x1d0data
RT_BITMAP0x137c540x1d0data
RT_BITMAP0x137e240x1d0data
RT_BITMAP0x137ff40x1d0data
RT_BITMAP0x1381c40x488dataRussianRussia
RT_BITMAP0x13864c0xc0data
RT_BITMAP0x13870c0xe0data
RT_BITMAP0x1387ec0xe0data
RT_BITMAP0x1388cc0xe0data
RT_BITMAP0x1389ac0xc0data
RT_BITMAP0x138a6c0xc0data
RT_BITMAP0x138b2c0xe0data
RT_BITMAP0x138c0c0xc58dataEnglishUnited States
RT_BITMAP0x1398640x328dataEnglishUnited States
RT_BITMAP0x139b8c0xc0data
RT_BITMAP0x139c4c0xe0data
RT_BITMAP0x139d2c0xe8dataRussianRussia
RT_BITMAP0x139e140x328dataEnglishUnited States
RT_BITMAP0x13a13c0xc0data
RT_BITMAP0x13a1fc0x328dataEnglishUnited States
RT_BITMAP0x13a5240x328dataEnglishUnited States
RT_BITMAP0x13a84c0x328dataEnglishUnited States
RT_BITMAP0x13ab740xe0data
RT_ICON0x1555f40xea8dBase III DBT, version number 0, next free block index 40RussianRussia
RT_DIALOG0x13bafc0x52data
RT_STRING0x13bb500x4cdata
RT_STRING0x13bb9c0xaadata
RT_STRING0x13bc480x186data
RT_STRING0x13bdd00x1cedata
RT_STRING0x13bfa00x144data
RT_STRING0x13c0e40x7edata
RT_STRING0x13c1640x24data
RT_STRING0x13c1880x228data
RT_STRING0x13c3b00x1e0data
RT_STRING0x13c5900x198data
RT_STRING0x13c7280x158data
RT_STRING0x13c8800x2ecdata
RT_STRING0x13cb6c0xd8data
RT_STRING0x13cc440x118data
RT_STRING0x13cd5c0x268data
RT_STRING0x13cfc40x3fcdata
RT_STRING0x13d3c00x390data
RT_STRING0x13d7500x378data
RT_STRING0x13dac80x408data
RT_STRING0x13ded00xecdata
RT_STRING0x13dfbc0xd0data
RT_STRING0x13e08c0x29cdata
RT_STRING0x13e3280x40cdata
RT_STRING0x13e7340x330data
RT_STRING0x13ea640x314SysEx File - AdamsSmith
RT_RCDATA0x13ed780x4data
RT_RCDATA0x13ed7c0xcbfdataEnglishUnited States
RT_RCDATA0x13fa3c0x3a5dataEnglishUnited States
RT_RCDATA0x13fde40xd58dataRussianRussia
RT_RCDATA0x140b3c0xd0ddataRussianRussia
RT_RCDATA0x14184c0x10data
RT_RCDATA0x14185c0x4ISO-8859 text, with no line terminators
RT_RCDATA0x1418600x618data
RT_RCDATA0x141e780x434dataEnglishUnited States
RT_RCDATA0x1422ac0x4b1dataEnglishUnited States
RT_RCDATA0x1427600x1a1dataEnglishUnited States
RT_RCDATA0x1429040x671dataEnglishUnited States
RT_RCDATA0x142f780x7b1dataEnglishUnited States
RT_RCDATA0x14372c0x8data
RT_RCDATA0x1437340x2a7ddata
RT_RCDATA0x1461b40x640data
RT_RCDATA0x1467f40x1bdbdata
RT_RCDATA0x1483d00x2545data
RT_RCDATA0x14a9180x2f3data
RT_RCDATA0x14ac0c0x1adcdata
RT_RCDATA0x14c6e80x1adcdata
RT_GROUP_CURSOR0x14e1c40x14dataEnglishUnited States
RT_GROUP_CURSOR0x14e1d80x14data
RT_GROUP_CURSOR0x14e1ec0x14data
RT_GROUP_CURSOR0x14e2000x14data
RT_GROUP_CURSOR0x14e2140x14data
RT_GROUP_CURSOR0x14e2280x14data
RT_GROUP_CURSOR0x14e23c0x14Non-ISO extended-ASCII text, with escape sequences
RT_GROUP_CURSOR0x14e2500x14Non-ISO extended-ASCII text, with no line terminators
RT_GROUP_ICON0x1564a00x14dataRussianRussia
RT_MANIFEST0x1564b80x32cXML 1.0 document, ASCII text, with CRLF line terminatorsFrenchFrance
RT_MANIFEST0x1567e80x2f0XML 1.0 document, ASCII text, with CRLF line terminatorsRussianRussia
DLLImport
advapi32.dllRegCloseKey
comctl32.dllImageList_Add
gdi32.dllSaveDC
KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
ntdllRtlAdjustPrivilege
ntdll.dllRtlSetProcessIsCritical
ole32.dllCoInitialize
oleaut32.dllVariantCopy
shell32.dllSHGetMalloc
user32.dllGetDC
version.dllVerQueryValueA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
RussianRussia
FrenchFrance
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:12:17:12
Start date:25/05/2022
Path:C:\Users\user\Desktop\WinLock.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\WinLock.exe"
Imagebase:0x400000
File size:492544 bytes
MD5 hash:5E5043A0455E8652D0A58C8611E47903
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low

Target ID:1
Start time:12:17:13
Start date:25/05/2022
Path:C:\Windows\explorer.exe
Wow64 process (32bit):false
Commandline:explorer.exe
Imagebase:0x7ff6f3b00000
File size:3933184 bytes
MD5 hash:AD5296B280E8F522A8A897C96BAB0E1D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly