Analysis
-
max time kernel
8s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 17:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe
Resource
win7-20231215-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe
Resource
win10v2004-20231222-en
15 signatures
150 seconds
General
-
Target
2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe
-
Size
215KB
-
MD5
7acb66c3bb2c35f158d556b38105048c
-
SHA1
4d62201f7e83bd139b4218ef16badab466cffe08
-
SHA256
6406b02f172ab556401dee7d1274a3e78bf3478675b564168a9498f84f3bf27b
-
SHA512
434901cbf6b840e3ad88b0b97f8e3f303be991b9b751458d4e3d70567057a4daac87c3d62c7db3e7167dd312bfad94c476d282a6b58233e275927ed12c9c1ebc
-
SSDEEP
3072:DT7ayiGb1choJA2+YaZK8L7L1XCn2yI4VaIjt0iu7Buo9VWTF79H89GTnv+d:m2xciAPxZKl5VaIlu7AoifSS+d
Score
10/10
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 24 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Executes dropped EXE 2 IoCs
pid Process 2260 KkwwEMIY.exe 2724 niwMEYok.exe -
Loads dropped DLL 4 IoCs
pid Process 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\niwMEYok.exe = "C:\\ProgramData\\KuIIIwcs\\niwMEYok.exe" 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\KkwwEMIY.exe = "C:\\Users\\Admin\\tkIAUQkU\\KkwwEMIY.exe" KkwwEMIY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\niwMEYok.exe = "C:\\ProgramData\\KuIIIwcs\\niwMEYok.exe" niwMEYok.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\KkwwEMIY.exe = "C:\\Users\\Admin\\tkIAUQkU\\KkwwEMIY.exe" 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1660 reg.exe 2264 reg.exe 3000 reg.exe 1672 reg.exe 2760 reg.exe 888 reg.exe 2524 reg.exe 2824 reg.exe 2632 reg.exe 1568 reg.exe 624 reg.exe 2656 reg.exe 2644 reg.exe 2292 reg.exe 2248 reg.exe 2768 reg.exe 1976 reg.exe 2360 reg.exe 1228 reg.exe 980 reg.exe 1120 reg.exe 1716 reg.exe 2948 reg.exe 1100 reg.exe 2584 reg.exe 828 reg.exe 2716 reg.exe 2524 reg.exe 2968 reg.exe 2896 reg.exe 808 reg.exe 1096 reg.exe 1780 reg.exe 2960 reg.exe 2124 reg.exe 2132 reg.exe 2224 reg.exe 292 reg.exe 3016 reg.exe 1204 reg.exe 2000 reg.exe 2864 reg.exe 2952 reg.exe 2184 reg.exe 2328 reg.exe 2640 reg.exe 2788 reg.exe 740 reg.exe 624 reg.exe 1880 reg.exe 900 reg.exe 2380 reg.exe 788 reg.exe 2644 reg.exe 1416 reg.exe 1416 reg.exe 1440 reg.exe 1324 reg.exe 2092 reg.exe 1596 reg.exe 2740 reg.exe 2684 reg.exe 1788 reg.exe 2448 reg.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1020 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1020 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2328 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2328 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1684 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1684 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1036 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1036 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2768 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2768 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2856 conhost.exe 2856 conhost.exe 1552 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1552 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2284 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2284 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1736 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1736 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1992 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1992 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2372 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2372 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2648 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2648 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1072 conhost.exe 1072 conhost.exe 2340 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2340 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2312 reg.exe 2312 reg.exe 864 cscript.exe 864 cscript.exe 2200 conhost.exe 2200 conhost.exe 2608 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2608 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1268 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1268 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2716 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2716 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2256 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 2256 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 1136 reg.exe 1136 reg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2260 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 28 PID 1944 wrote to memory of 2260 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 28 PID 1944 wrote to memory of 2260 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 28 PID 1944 wrote to memory of 2260 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 28 PID 1944 wrote to memory of 2724 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 31 PID 1944 wrote to memory of 2724 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 31 PID 1944 wrote to memory of 2724 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 31 PID 1944 wrote to memory of 2724 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 31 PID 1944 wrote to memory of 2736 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 30 PID 1944 wrote to memory of 2736 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 30 PID 1944 wrote to memory of 2736 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 30 PID 1944 wrote to memory of 2736 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 30 PID 2736 wrote to memory of 2680 2736 cmd.exe 33 PID 2736 wrote to memory of 2680 2736 cmd.exe 33 PID 2736 wrote to memory of 2680 2736 cmd.exe 33 PID 2736 wrote to memory of 2680 2736 cmd.exe 33 PID 1944 wrote to memory of 2772 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 32 PID 1944 wrote to memory of 2772 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 32 PID 1944 wrote to memory of 2772 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 32 PID 1944 wrote to memory of 2772 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 32 PID 1944 wrote to memory of 2664 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 34 PID 1944 wrote to memory of 2664 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 34 PID 1944 wrote to memory of 2664 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 34 PID 1944 wrote to memory of 2664 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 34 PID 1944 wrote to memory of 2764 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 40 PID 1944 wrote to memory of 2764 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 40 PID 1944 wrote to memory of 2764 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 40 PID 1944 wrote to memory of 2764 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 40 PID 1944 wrote to memory of 2544 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 38 PID 1944 wrote to memory of 2544 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 38 PID 1944 wrote to memory of 2544 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 38 PID 1944 wrote to memory of 2544 1944 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 38 PID 2544 wrote to memory of 1844 2544 cmd.exe 41 PID 2544 wrote to memory of 1844 2544 cmd.exe 41 PID 2544 wrote to memory of 1844 2544 cmd.exe 41 PID 2544 wrote to memory of 1844 2544 cmd.exe 41 PID 2680 wrote to memory of 2144 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 42 PID 2680 wrote to memory of 2144 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 42 PID 2680 wrote to memory of 2144 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 42 PID 2680 wrote to memory of 2144 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 42 PID 2144 wrote to memory of 760 2144 cmd.exe 44 PID 2144 wrote to memory of 760 2144 cmd.exe 44 PID 2144 wrote to memory of 760 2144 cmd.exe 44 PID 2144 wrote to memory of 760 2144 cmd.exe 44 PID 2680 wrote to memory of 2784 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 45 PID 2680 wrote to memory of 2784 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 45 PID 2680 wrote to memory of 2784 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 45 PID 2680 wrote to memory of 2784 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 45 PID 2680 wrote to memory of 2820 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 46 PID 2680 wrote to memory of 2820 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 46 PID 2680 wrote to memory of 2820 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 46 PID 2680 wrote to memory of 2820 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 46 PID 2680 wrote to memory of 2708 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 48 PID 2680 wrote to memory of 2708 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 48 PID 2680 wrote to memory of 2708 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 48 PID 2680 wrote to memory of 2708 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 48 PID 2680 wrote to memory of 1676 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 51 PID 2680 wrote to memory of 1676 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 51 PID 2680 wrote to memory of 1676 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 51 PID 2680 wrote to memory of 1676 2680 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 51 PID 760 wrote to memory of 1852 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 53 PID 760 wrote to memory of 1852 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 53 PID 760 wrote to memory of 1852 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 53 PID 760 wrote to memory of 1852 760 2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe 53 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\tkIAUQkU\KkwwEMIY.exe"C:\Users\Admin\tkIAUQkU\KkwwEMIY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2260
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"6⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"8⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"10⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"12⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"14⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"16⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock17⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"18⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"20⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"22⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"24⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"26⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"28⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"30⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock31⤵PID:1072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"32⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"34⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock35⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"36⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock37⤵PID:864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"38⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock39⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"40⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"42⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"44⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"46⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock47⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"48⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock49⤵PID:1136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"50⤵
- UAC bypass
- Checks whether UAC is enabled
- System policy modification
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock51⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"52⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock53⤵PID:536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"54⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock55⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"56⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock57⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"58⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock59⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"60⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock61⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"62⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock63⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"64⤵
- Modifies visibility of file extensions in Explorer
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock65⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"66⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock67⤵PID:1892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"68⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock69⤵PID:1480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"70⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock71⤵PID:572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"72⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock73⤵PID:1548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"74⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock75⤵PID:1100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"76⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock77⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"78⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock79⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"80⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock81⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"82⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock83⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"84⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock85⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"86⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock87⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"88⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock89⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"90⤵
- Modifies visibility of file extensions in Explorer
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock91⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"92⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock93⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"94⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock95⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"96⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock97⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"98⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock99⤵PID:1700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"100⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock101⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"102⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock103⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"104⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock105⤵PID:2316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"106⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock107⤵
- Modifies visibility of file extensions in Explorer
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"108⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock109⤵PID:1304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"110⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock111⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"112⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock113⤵PID:2316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"114⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock115⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"116⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock117⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"118⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock119⤵PID:2948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"120⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock121⤵PID:2248
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_7acb66c3bb2c35f158d556b38105048c_virlock"122⤵PID:2600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-