Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 17:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe
-
Size
209KB
-
MD5
bd0b4c1285f94222c22c6acfa4dc9384
-
SHA1
056a7c7c8e33a2adf4789ac00f59c35cf3c4e783
-
SHA256
b098e7888d8952873d9c7455f548313596c775eb6dfd30f3971ac5671f61b5cd
-
SHA512
561f87b8191a100965b1cf92fbb99cd79d64f69ac8e20ad76a8b0cbe279885b5c6e1519046e1242e72576932aebff329994dd64d22f2d4fc6ad1d23e1d41afaf
-
SSDEEP
6144:nbbgxfwyn8Lqf2yb6TfJBMWe4dD+1zuaTd7OrwmdsHNP4G9N:nO8LFbQuxMyqJ4GL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe -
Renames multiple (56) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Control Panel\International\Geo\Nation IEcoAcUc.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 IEcoAcUc.exe 2796 LYcccYkY.exe -
Loads dropped DLL 20 IoCs
pid Process 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\IEcoAcUc.exe = "C:\\Users\\Admin\\JcsQgQIA\\IEcoAcUc.exe" IEcoAcUc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LYcccYkY.exe = "C:\\ProgramData\\GYUgEcgs\\LYcccYkY.exe" LYcccYkY.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\IEcoAcUc.exe = "C:\\Users\\Admin\\JcsQgQIA\\IEcoAcUc.exe" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LYcccYkY.exe = "C:\\ProgramData\\GYUgEcgs\\LYcccYkY.exe" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2928 reg.exe 1136 reg.exe 580 reg.exe 2468 reg.exe 2416 reg.exe 2316 reg.exe 1680 reg.exe 1472 reg.exe 2412 reg.exe 1536 reg.exe 2740 reg.exe 2436 reg.exe 2020 reg.exe 2544 reg.exe 1936 reg.exe 2132 reg.exe 2732 reg.exe 2216 reg.exe 1360 reg.exe 2640 reg.exe 1544 reg.exe 1660 reg.exe 1764 reg.exe 2084 reg.exe 904 reg.exe 2416 reg.exe 1896 reg.exe 540 reg.exe 800 reg.exe 2708 reg.exe 2616 reg.exe 1468 reg.exe 2584 reg.exe 2696 reg.exe 2592 reg.exe 1020 reg.exe 404 reg.exe 2544 reg.exe 1756 reg.exe 2788 reg.exe 2908 reg.exe 1500 reg.exe 380 reg.exe 2164 reg.exe 2128 reg.exe 2092 reg.exe 2052 reg.exe 2156 reg.exe 2176 reg.exe 876 reg.exe 2800 reg.exe 1936 reg.exe 1224 reg.exe 2572 reg.exe 2964 reg.exe 1132 reg.exe 1972 reg.exe 2620 reg.exe 2592 reg.exe 1920 reg.exe 1980 reg.exe 1476 reg.exe 1416 reg.exe 1000 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1876 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1876 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1332 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1332 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 580 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 580 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1008 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1008 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1744 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1744 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1656 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1656 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2460 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2460 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1272 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1272 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 880 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 880 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2412 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2412 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1468 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1468 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2772 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2772 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2744 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2744 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 848 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 848 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2904 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2904 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2740 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2740 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 928 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 928 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 904 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 904 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1416 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1416 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1916 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1916 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2692 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2692 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2720 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2720 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1864 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1864 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1772 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 1772 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2488 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 848 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 848 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2584 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2584 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2736 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 2736 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 IEcoAcUc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe 2716 IEcoAcUc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2716 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 28 PID 3068 wrote to memory of 2716 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 28 PID 3068 wrote to memory of 2716 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 28 PID 3068 wrote to memory of 2716 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 28 PID 3068 wrote to memory of 2796 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 29 PID 3068 wrote to memory of 2796 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 29 PID 3068 wrote to memory of 2796 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 29 PID 3068 wrote to memory of 2796 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 29 PID 3068 wrote to memory of 2908 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 30 PID 3068 wrote to memory of 2908 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 30 PID 3068 wrote to memory of 2908 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 30 PID 3068 wrote to memory of 2908 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 30 PID 2908 wrote to memory of 2372 2908 cmd.exe 32 PID 2908 wrote to memory of 2372 2908 cmd.exe 32 PID 2908 wrote to memory of 2372 2908 cmd.exe 32 PID 2908 wrote to memory of 2372 2908 cmd.exe 32 PID 3068 wrote to memory of 2604 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 33 PID 3068 wrote to memory of 2604 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 33 PID 3068 wrote to memory of 2604 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 33 PID 3068 wrote to memory of 2604 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 33 PID 3068 wrote to memory of 3028 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 34 PID 3068 wrote to memory of 3028 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 34 PID 3068 wrote to memory of 3028 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 34 PID 3068 wrote to memory of 3028 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 34 PID 3068 wrote to memory of 2624 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 40 PID 3068 wrote to memory of 2624 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 40 PID 3068 wrote to memory of 2624 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 40 PID 3068 wrote to memory of 2624 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 40 PID 3068 wrote to memory of 2640 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 39 PID 3068 wrote to memory of 2640 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 39 PID 3068 wrote to memory of 2640 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 39 PID 3068 wrote to memory of 2640 3068 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 39 PID 2640 wrote to memory of 1872 2640 cmd.exe 41 PID 2640 wrote to memory of 1872 2640 cmd.exe 41 PID 2640 wrote to memory of 1872 2640 cmd.exe 41 PID 2640 wrote to memory of 1872 2640 cmd.exe 41 PID 2372 wrote to memory of 2460 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 42 PID 2372 wrote to memory of 2460 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 42 PID 2372 wrote to memory of 2460 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 42 PID 2372 wrote to memory of 2460 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 42 PID 2460 wrote to memory of 1876 2460 cmd.exe 44 PID 2460 wrote to memory of 1876 2460 cmd.exe 44 PID 2460 wrote to memory of 1876 2460 cmd.exe 44 PID 2460 wrote to memory of 1876 2460 cmd.exe 44 PID 2372 wrote to memory of 2664 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 45 PID 2372 wrote to memory of 2664 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 45 PID 2372 wrote to memory of 2664 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 45 PID 2372 wrote to memory of 2664 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 45 PID 2372 wrote to memory of 2508 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 46 PID 2372 wrote to memory of 2508 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 46 PID 2372 wrote to memory of 2508 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 46 PID 2372 wrote to memory of 2508 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 46 PID 2372 wrote to memory of 2200 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 47 PID 2372 wrote to memory of 2200 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 47 PID 2372 wrote to memory of 2200 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 47 PID 2372 wrote to memory of 2200 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 47 PID 2372 wrote to memory of 1708 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 48 PID 2372 wrote to memory of 1708 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 48 PID 2372 wrote to memory of 1708 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 48 PID 2372 wrote to memory of 1708 2372 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe 48 PID 1708 wrote to memory of 1508 1708 cmd.exe 53 PID 1708 wrote to memory of 1508 1708 cmd.exe 53 PID 1708 wrote to memory of 1508 1708 cmd.exe 53 PID 1708 wrote to memory of 1508 1708 cmd.exe 53 -
System policy modification 1 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\JcsQgQIA\IEcoAcUc.exe"C:\Users\Admin\JcsQgQIA\IEcoAcUc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2716
-
-
C:\ProgramData\GYUgEcgs\LYcccYkY.exe"C:\ProgramData\GYUgEcgs\LYcccYkY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"6⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"8⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"10⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"12⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"14⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"16⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"18⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"20⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"22⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"24⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"26⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"28⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"30⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"32⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"34⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"36⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"38⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"40⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"42⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"44⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1416 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"46⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"48⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"50⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"52⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"54⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"56⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"58⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"60⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"62⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"64⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock65⤵PID:1308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"66⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock67⤵PID:852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"68⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock69⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"70⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock71⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"72⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock73⤵PID:2632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"74⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock75⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"76⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock77⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"78⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock79⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"80⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock81⤵PID:336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"82⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock83⤵PID:1156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"84⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock85⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"86⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock87⤵PID:1224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"88⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock89⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"90⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock91⤵PID:1220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"92⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock93⤵PID:1528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"94⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock95⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"96⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock97⤵PID:580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"98⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock99⤵PID:1008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"100⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock101⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"102⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock103⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"104⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock105⤵PID:1708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"106⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock107⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"108⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock109⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"110⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock111⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"112⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock113⤵PID:1548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"114⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock115⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"116⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock117⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"118⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock119⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"120⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock121⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-01-26_bd0b4c1285f94222c22c6acfa4dc9384_virlock"122⤵PID:3044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-