Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe
-
Size
325KB
-
MD5
d6d60e591fc168d89850fd7f7b0faf81
-
SHA1
9caff4b2b4e7ee106e853cd791f16d0f1512a459
-
SHA256
8958c5ef0084947311bce1141434b5f3159faf3a60631845d86428f0c7aa1673
-
SHA512
b7108377933bf557f76eb1a7918d715b03202e1e73ec63945579de1ce31d2fcb5de72cd14f28a4c1b914d69587bb911bdefaba7c445bb2fcb3dc24a81c67303e
-
SSDEEP
6144:UIQqX0WRFU4uZyY2XKGUun8uTeXZLEHXcpDu6cL4XcjZ9IKZd:UsX0WRuZyfZn8tXZLiUDm4kLZZd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation LgMUEkoE.exe -
Executes dropped EXE 2 IoCs
pid Process 812 GIocUcss.exe 4808 LgMUEkoE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LgMUEkoE.exe = "C:\\ProgramData\\WMcoIUoE\\LgMUEkoE.exe" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LgMUEkoE.exe = "C:\\ProgramData\\WMcoIUoE\\LgMUEkoE.exe" LgMUEkoE.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GIocUcss.exe = "C:\\Users\\Admin\\FkQAUwEE\\GIocUcss.exe" GIocUcss.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GIocUcss.exe = "C:\\Users\\Admin\\FkQAUwEE\\GIocUcss.exe" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 548 reg.exe 4948 reg.exe 1848 reg.exe 5064 reg.exe 4852 reg.exe 4144 reg.exe 4484 reg.exe 1404 reg.exe 3500 reg.exe 2284 reg.exe 4596 Process not Found 736 reg.exe 4428 reg.exe 1812 reg.exe 3320 reg.exe 3048 reg.exe 2104 reg.exe 4480 Process not Found 4084 reg.exe 2964 reg.exe 3740 reg.exe 3764 reg.exe 1564 reg.exe 4428 reg.exe 2172 reg.exe 4776 reg.exe 4144 reg.exe 1564 reg.exe 764 Process not Found 4024 reg.exe 3324 reg.exe 684 reg.exe 1168 reg.exe 1988 reg.exe 2676 Process not Found 1200 reg.exe 4000 reg.exe 3276 reg.exe 4236 reg.exe 4452 Process not Found 4812 reg.exe 2364 reg.exe 4484 reg.exe 2008 Process not Found 776 reg.exe 4268 reg.exe 4824 reg.exe 4700 Process not Found 1548 reg.exe 1184 reg.exe 3276 reg.exe 60 reg.exe 1312 reg.exe 776 reg.exe 3116 reg.exe 4496 reg.exe 3828 reg.exe 436 Process not Found 2296 Process not Found 2964 reg.exe 4516 reg.exe 3248 reg.exe 1168 reg.exe 5064 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3304 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3304 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3304 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3304 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3500 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3500 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3500 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3500 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4252 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4252 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4252 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4252 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1124 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1124 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1124 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1124 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4696 reg.exe 4696 reg.exe 4696 reg.exe 4696 reg.exe 1812 reg.exe 1812 reg.exe 1812 reg.exe 1812 reg.exe 4936 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4936 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4936 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4936 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3752 cmd.exe 3752 cmd.exe 3752 cmd.exe 3752 cmd.exe 4632 cmd.exe 4632 cmd.exe 4632 cmd.exe 4632 cmd.exe 3496 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3496 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3496 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 3496 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 840 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 840 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 840 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 840 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4532 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4532 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4532 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 4532 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 1044 Conhost.exe 1044 Conhost.exe 1044 Conhost.exe 1044 Conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4808 LgMUEkoE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe 4808 LgMUEkoE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1468 wrote to memory of 812 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 87 PID 1468 wrote to memory of 812 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 87 PID 1468 wrote to memory of 812 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 87 PID 1468 wrote to memory of 4808 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 89 PID 1468 wrote to memory of 4808 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 89 PID 1468 wrote to memory of 4808 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 89 PID 1468 wrote to memory of 388 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 90 PID 1468 wrote to memory of 388 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 90 PID 1468 wrote to memory of 388 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 90 PID 1468 wrote to memory of 1524 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 100 PID 1468 wrote to memory of 1524 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 100 PID 1468 wrote to memory of 1524 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 100 PID 1468 wrote to memory of 1076 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 99 PID 1468 wrote to memory of 1076 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 99 PID 1468 wrote to memory of 1076 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 99 PID 1468 wrote to memory of 4888 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 93 PID 1468 wrote to memory of 4888 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 93 PID 1468 wrote to memory of 4888 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 93 PID 1468 wrote to memory of 2368 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 92 PID 1468 wrote to memory of 2368 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 92 PID 1468 wrote to memory of 2368 1468 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 92 PID 388 wrote to memory of 8 388 cmd.exe 98 PID 388 wrote to memory of 8 388 cmd.exe 98 PID 388 wrote to memory of 8 388 cmd.exe 98 PID 2368 wrote to memory of 4000 2368 cmd.exe 101 PID 2368 wrote to memory of 4000 2368 cmd.exe 101 PID 2368 wrote to memory of 4000 2368 cmd.exe 101 PID 8 wrote to memory of 3116 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 103 PID 8 wrote to memory of 3116 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 103 PID 8 wrote to memory of 3116 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 103 PID 3116 wrote to memory of 628 3116 cmd.exe 105 PID 3116 wrote to memory of 628 3116 cmd.exe 105 PID 3116 wrote to memory of 628 3116 cmd.exe 105 PID 8 wrote to memory of 4776 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 110 PID 8 wrote to memory of 4776 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 110 PID 8 wrote to memory of 4776 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 110 PID 8 wrote to memory of 1824 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 109 PID 8 wrote to memory of 1824 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 109 PID 8 wrote to memory of 1824 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 109 PID 8 wrote to memory of 4188 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 108 PID 8 wrote to memory of 4188 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 108 PID 8 wrote to memory of 4188 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 108 PID 8 wrote to memory of 3480 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 107 PID 8 wrote to memory of 3480 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 107 PID 8 wrote to memory of 3480 8 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 107 PID 3480 wrote to memory of 3756 3480 cmd.exe 114 PID 3480 wrote to memory of 3756 3480 cmd.exe 114 PID 3480 wrote to memory of 3756 3480 cmd.exe 114 PID 628 wrote to memory of 1364 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 115 PID 628 wrote to memory of 1364 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 115 PID 628 wrote to memory of 1364 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 115 PID 1364 wrote to memory of 3304 1364 cmd.exe 117 PID 1364 wrote to memory of 3304 1364 cmd.exe 117 PID 1364 wrote to memory of 3304 1364 cmd.exe 117 PID 628 wrote to memory of 2964 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 121 PID 628 wrote to memory of 2964 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 121 PID 628 wrote to memory of 2964 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 121 PID 628 wrote to memory of 2960 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 120 PID 628 wrote to memory of 2960 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 120 PID 628 wrote to memory of 2960 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 120 PID 628 wrote to memory of 2456 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 119 PID 628 wrote to memory of 2456 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 119 PID 628 wrote to memory of 2456 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 119 PID 628 wrote to memory of 2948 628 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe 118 -
System policy modification 1 TTPs 34 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\FkQAUwEE\GIocUcss.exe"C:\Users\Admin\FkQAUwEE\GIocUcss.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:812
-
-
C:\ProgramData\WMcoIUoE\LgMUEkoE.exe"C:\ProgramData\WMcoIUoE\LgMUEkoE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"8⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"10⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"12⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"14⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock15⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"16⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock17⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"18⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"20⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock21⤵PID:3752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"22⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock23⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"24⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"26⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"28⤵PID:3368
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"30⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock31⤵PID:1044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"32⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock33⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"34⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock35⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"36⤵PID:3712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\owAYgEEk.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""36⤵PID:1032
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵PID:3368
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵PID:2396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵PID:208
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵PID:2064
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CWkMkYUY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""34⤵PID:4392
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵PID:864
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eCgYQggw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""32⤵PID:1548
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵PID:3764
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵PID:4388
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵PID:2884
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵PID:736
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eIMMoMUs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""30⤵PID:1200
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵PID:2680
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵PID:2056
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hQwssAgc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""28⤵PID:2788
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵PID:3632
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵PID:60
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵PID:4056
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pAYgYAIA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""26⤵PID:3736
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- Modifies registry key
PID:4024
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
- Modifies registry key
PID:4428
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xSsIIsoA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""24⤵PID:1512
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵PID:4388
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵PID:1744
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\TOcwoMgE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""22⤵PID:4236
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵PID:2484
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
PID:976
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵PID:1124
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mkMIIwEM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""20⤵PID:3940
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵PID:1032
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵PID:4828
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵PID:2908
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
PID:3320
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵PID:4408
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵PID:4440
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵PID:4456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV119⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EWMsoUEo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""18⤵PID:3724
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵PID:4368
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV118⤵PID:3152
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aOUkIwAk.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""16⤵PID:1356
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵PID:1856
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
PID:1868
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵PID:1396
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵PID:2948
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵PID:1044
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵PID:3948
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵PID:4076
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GswckIUM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""14⤵PID:1980
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵PID:916
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fgEEoQYk.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""12⤵PID:5088
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵PID:2224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵PID:2824
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵PID:2156
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵PID:2396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV113⤵PID:2788
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵PID:4940
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵PID:804
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵PID:2492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pokcsQcY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""10⤵PID:2544
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵PID:436
-
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
- Modifies registry key
PID:736
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵PID:4268
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵PID:3744
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XGMMcskg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""8⤵PID:4936
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵PID:4812
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gSMkkYso.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""6⤵PID:2948
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵PID:3736
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs8⤵PID:2020
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵PID:2456
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵PID:2960
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
PID:2964
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gQkUoAMo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""4⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵PID:3756
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵PID:4188
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵PID:1824
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:4636
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies registry key
PID:4776
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sYUsggQU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
- UAC bypass
PID:4888
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵PID:1076
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵PID:1524
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:4216
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs1⤵PID:2540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock1⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"2⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock3⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"4⤵PID:932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock5⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"6⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock7⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"8⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock9⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"10⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock11⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"12⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock13⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"14⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock15⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"16⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock17⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"18⤵
- Checks whether UAC is enabled
- System policy modification
PID:64 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock19⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"20⤵
- Modifies visibility of file extensions in Explorer
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock21⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"22⤵PID:4132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV123⤵PID:736
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock23⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"24⤵PID:8
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock25⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"26⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock27⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"28⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock29⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"30⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock31⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"32⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock33⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"34⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock35⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"36⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock37⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"38⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock39⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"40⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock41⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"42⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock43⤵PID:2788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"44⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock45⤵PID:3528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"46⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock47⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"48⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock49⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"50⤵
- Modifies visibility of file extensions in Explorer
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock51⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"52⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock53⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"54⤵PID:628
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock55⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"56⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock57⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"58⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock59⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"60⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock61⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"62⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock63⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"64⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock65⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"66⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock67⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"68⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock69⤵PID:764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"70⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock71⤵PID:2012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"72⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock73⤵PID:3164
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"74⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock75⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"76⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock77⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"78⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock79⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"80⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock81⤵PID:2576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"82⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock83⤵PID:1308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"84⤵PID:4944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock85⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"86⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock87⤵
- Modifies visibility of file extensions in Explorer
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"88⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock89⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"90⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock91⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"92⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock93⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"94⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock95⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"96⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock97⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"98⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock99⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"100⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock101⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"102⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock103⤵PID:3296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"104⤵PID:4396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock105⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"106⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock107⤵PID:4144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"108⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock109⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"110⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock111⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"112⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock113⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"114⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock115⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"116⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock117⤵PID:1692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"118⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock119⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"120⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock121⤵PID:3804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-01-25_d6d60e591fc168d89850fd7f7b0faf81_virlock"122⤵PID:1480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-