Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe
-
Size
213KB
-
MD5
ce621c0a61fa467b80d3942f722fecab
-
SHA1
6ce0db0be9eae2b928220c7d54d6c4b1a998380c
-
SHA256
91c0b5030b319793a7ec551dcdd9859ddb32e399b042db90ff11fc71d108a48e
-
SHA512
c22f97d586164ed5e47cbdc6bacbbc74b80a0d3500194550ff8e56493c89ca0fd2782c030a508b9037de8d639c4420c67a2e6bd13cd4f35290cc21ed2b43d4d2
-
SSDEEP
6144:0/a2LZw/RPf6t8DFBoHx9kpqTEWp4hhF5jQ0ig1N7XG7B9OjZN:3xPfC8yg1N72FAjP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation dIAoEIcE.exe -
Executes dropped EXE 2 IoCs
pid Process 2408 dIAoEIcE.exe 1636 MkAEMMUk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dIAoEIcE.exe = "C:\\Users\\Admin\\GSAcYQEg\\dIAoEIcE.exe" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MkAEMMUk.exe = "C:\\ProgramData\\YUEIYYoU\\MkAEMMUk.exe" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MkAEMMUk.exe = "C:\\ProgramData\\YUEIYYoU\\MkAEMMUk.exe" MkAEMMUk.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dIAoEIcE.exe = "C:\\Users\\Admin\\GSAcYQEg\\dIAoEIcE.exe" dIAoEIcE.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe dIAoEIcE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4576 reg.exe 3028 reg.exe 3592 reg.exe 3492 reg.exe 1664 Process not Found 5088 Process not Found 2692 reg.exe 4196 reg.exe 3168 reg.exe 4968 reg.exe 4412 reg.exe 1720 reg.exe 4568 reg.exe 1840 reg.exe 2648 reg.exe 1140 reg.exe 3728 reg.exe 4564 reg.exe 1136 Process not Found 428 reg.exe 1720 reg.exe 3564 reg.exe 1252 reg.exe 220 reg.exe 2624 reg.exe 2728 reg.exe 1112 reg.exe 3124 reg.exe 5080 reg.exe 384 Process not Found 1572 reg.exe 1988 reg.exe 3936 reg.exe 4704 reg.exe 4384 reg.exe 4032 reg.exe 2044 reg.exe 4048 reg.exe 1136 reg.exe 964 reg.exe 4600 reg.exe 3128 reg.exe 4920 reg.exe 5080 reg.exe 4588 reg.exe 848 reg.exe 548 reg.exe 3956 reg.exe 2608 reg.exe 3456 reg.exe 2308 reg.exe 3188 reg.exe 4076 reg.exe 3456 reg.exe 2516 reg.exe 640 reg.exe 5092 reg.exe 3576 reg.exe 4576 reg.exe 548 reg.exe 1916 reg.exe 4828 reg.exe 1136 reg.exe 2720 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4076 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4076 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4076 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4076 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1088 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1088 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1088 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1088 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 864 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 864 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 864 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 864 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2528 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2528 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2528 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2528 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3016 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3016 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3016 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 3016 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2208 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2208 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2208 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2208 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2324 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2324 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2324 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2324 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4516 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4516 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4516 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4516 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2368 reg.exe 2368 reg.exe 2368 reg.exe 2368 reg.exe 1888 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1888 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1888 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 1888 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 2516 Conhost.exe 2516 Conhost.exe 2516 Conhost.exe 2516 Conhost.exe 384 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 384 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 384 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 384 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4536 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4536 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4536 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 4536 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2408 dIAoEIcE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe 2408 dIAoEIcE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 2408 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 86 PID 3988 wrote to memory of 2408 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 86 PID 3988 wrote to memory of 2408 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 86 PID 3988 wrote to memory of 1636 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 87 PID 3988 wrote to memory of 1636 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 87 PID 3988 wrote to memory of 1636 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 87 PID 3988 wrote to memory of 4844 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 89 PID 3988 wrote to memory of 4844 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 89 PID 3988 wrote to memory of 4844 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 89 PID 3988 wrote to memory of 5072 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 91 PID 3988 wrote to memory of 5072 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 91 PID 3988 wrote to memory of 5072 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 91 PID 3988 wrote to memory of 964 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 98 PID 3988 wrote to memory of 964 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 98 PID 3988 wrote to memory of 964 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 98 PID 3988 wrote to memory of 4612 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 93 PID 3988 wrote to memory of 4612 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 93 PID 3988 wrote to memory of 4612 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 93 PID 3988 wrote to memory of 2192 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 92 PID 3988 wrote to memory of 2192 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 92 PID 3988 wrote to memory of 2192 3988 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 92 PID 4844 wrote to memory of 3640 4844 cmd.exe 99 PID 4844 wrote to memory of 3640 4844 cmd.exe 99 PID 4844 wrote to memory of 3640 4844 cmd.exe 99 PID 2192 wrote to memory of 4700 2192 cmd.exe 100 PID 2192 wrote to memory of 4700 2192 cmd.exe 100 PID 2192 wrote to memory of 4700 2192 cmd.exe 100 PID 3640 wrote to memory of 1924 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 102 PID 3640 wrote to memory of 1924 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 102 PID 3640 wrote to memory of 1924 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 102 PID 1924 wrote to memory of 2172 1924 cmd.exe 104 PID 1924 wrote to memory of 2172 1924 cmd.exe 104 PID 1924 wrote to memory of 2172 1924 cmd.exe 104 PID 3640 wrote to memory of 3400 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 105 PID 3640 wrote to memory of 3400 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 105 PID 3640 wrote to memory of 3400 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 105 PID 3640 wrote to memory of 1572 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 106 PID 3640 wrote to memory of 1572 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 106 PID 3640 wrote to memory of 1572 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 106 PID 3640 wrote to memory of 3204 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 107 PID 3640 wrote to memory of 3204 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 107 PID 3640 wrote to memory of 3204 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 107 PID 3640 wrote to memory of 3092 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 108 PID 3640 wrote to memory of 3092 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 108 PID 3640 wrote to memory of 3092 3640 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 108 PID 3092 wrote to memory of 5016 3092 cmd.exe 113 PID 3092 wrote to memory of 5016 3092 cmd.exe 113 PID 3092 wrote to memory of 5016 3092 cmd.exe 113 PID 2172 wrote to memory of 3028 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 114 PID 2172 wrote to memory of 3028 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 114 PID 2172 wrote to memory of 3028 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 114 PID 3028 wrote to memory of 4076 3028 cmd.exe 116 PID 3028 wrote to memory of 4076 3028 cmd.exe 116 PID 3028 wrote to memory of 4076 3028 cmd.exe 116 PID 2172 wrote to memory of 2044 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 117 PID 2172 wrote to memory of 2044 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 117 PID 2172 wrote to memory of 2044 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 117 PID 2172 wrote to memory of 4472 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 123 PID 2172 wrote to memory of 4472 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 123 PID 2172 wrote to memory of 4472 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 123 PID 2172 wrote to memory of 1832 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 122 PID 2172 wrote to memory of 1832 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 122 PID 2172 wrote to memory of 1832 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 122 PID 2172 wrote to memory of 4620 2172 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe 118 -
System policy modification 1 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\GSAcYQEg\dIAoEIcE.exe"C:\Users\Admin\GSAcYQEg\dIAoEIcE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2408
-
-
C:\ProgramData\YUEIYYoU\MkAEMMUk.exe"C:\ProgramData\YUEIYYoU\MkAEMMUk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"8⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"10⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"12⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"14⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"16⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"18⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"20⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"22⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock23⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"24⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"26⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock27⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"28⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"30⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"32⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock33⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"34⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock35⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"36⤵PID:3096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock37⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"38⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock39⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"40⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock41⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"42⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock43⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"44⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock45⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"46⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock47⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"48⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock49⤵PID:4992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"50⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock51⤵PID:3416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"52⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock53⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"54⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock55⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"56⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock57⤵PID:3576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"58⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock59⤵PID:4400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"60⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock61⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"62⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock63⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"64⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock65⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"66⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock67⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"68⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock69⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"70⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock71⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"72⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock73⤵PID:2264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"74⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock75⤵PID:3184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"76⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock77⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"78⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock79⤵PID:1228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"80⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock81⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"82⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock83⤵PID:2824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"84⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock85⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"86⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock87⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"88⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock89⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"90⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock91⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"92⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock93⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"94⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock95⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"96⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock97⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"98⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock99⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"100⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock101⤵PID:532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"102⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock103⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"104⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock105⤵PID:3296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"106⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock107⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"108⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock109⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"110⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock111⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"112⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock113⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"114⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock115⤵PID:364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"116⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock117⤵PID:3536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"118⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock119⤵PID:3732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"120⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock121⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_ce621c0a61fa467b80d3942f722fecab_virlock"122⤵PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-