Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 17:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe
-
Size
163KB
-
MD5
570b3eeade0b3f10847a0ae04c1f267d
-
SHA1
1116a61f810739bd69df1f27df5d9bf3b296476a
-
SHA256
f03d6a18cea63b214de796020c39dc757fb3a6066d7309da20441b0b57491ea1
-
SHA512
564e8d539dde5baa694309db34620ec3a96f3b5996948a5d5760cdd120b583024966afefa9df28b404a2c6024950eadfa5f5c6eda7eeb4ab50e0c61353bbdd41
-
SSDEEP
3072:NHC6dX5yKPFQ3hyikKIBOK46+veMHDVfEEnH6KCtZkRjrPctkr1rzwExFVZvWwxK:NH9X57P24ikKi+veYVXGtZ7KpzwEbVZ6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation jmEkokEk.exe -
Executes dropped EXE 2 IoCs
pid Process 1432 jmEkokEk.exe 4576 dUQcAYgc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmEkokEk.exe = "C:\\Users\\Admin\\SaMUsAgQ\\jmEkokEk.exe" 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dUQcAYgc.exe = "C:\\ProgramData\\qQwYAwMc\\dUQcAYgc.exe" 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jmEkokEk.exe = "C:\\Users\\Admin\\SaMUsAgQ\\jmEkokEk.exe" jmEkokEk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\dUQcAYgc.exe = "C:\\ProgramData\\qQwYAwMc\\dUQcAYgc.exe" dUQcAYgc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe jmEkokEk.exe File created C:\Windows\SysWOW64\shell32.dll.exe jmEkokEk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 376 reg.exe 576 reg.exe 576 reg.exe 1520 reg.exe 4060 reg.exe 1716 reg.exe 1940 reg.exe 4012 reg.exe 3220 reg.exe 3612 reg.exe 540 reg.exe 4028 reg.exe 628 reg.exe 2400 reg.exe 348 reg.exe 1708 reg.exe 736 reg.exe 2064 reg.exe 2752 reg.exe 3928 reg.exe 3116 reg.exe 3508 reg.exe 1152 reg.exe 440 reg.exe 3320 reg.exe 1984 reg.exe 2568 reg.exe 560 reg.exe 3320 reg.exe 3504 reg.exe 2400 reg.exe 4968 reg.exe 4136 reg.exe 4924 reg.exe 1456 reg.exe 2664 reg.exe 1152 reg.exe 1048 reg.exe 64 reg.exe 2220 reg.exe 4488 reg.exe 3312 reg.exe 3508 reg.exe 3928 reg.exe 4616 reg.exe 4492 reg.exe 1884 reg.exe 5092 reg.exe 4156 reg.exe 3156 reg.exe 3400 reg.exe 3036 reg.exe 4988 reg.exe 4988 reg.exe 2364 reg.exe 3676 reg.exe 2284 reg.exe 1036 reg.exe 4980 reg.exe 2640 reg.exe 4204 reg.exe 3144 reg.exe 3020 reg.exe 4560 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2528 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2528 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2528 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2528 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4352 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4352 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4352 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4352 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 5024 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 5024 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 5024 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 5024 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4104 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4104 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4104 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4104 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2520 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2520 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2520 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2520 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 3516 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 3516 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 3516 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 3516 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4632 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4632 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4632 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4632 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2696 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2696 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2696 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 2696 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4436 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4436 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4436 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4436 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4628 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4628 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4628 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4628 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4376 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4376 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4376 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4376 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4296 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4296 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4296 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 4296 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1884 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1884 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1884 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 1884 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1432 jmEkokEk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe 1432 jmEkokEk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1432 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 84 PID 2220 wrote to memory of 1432 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 84 PID 2220 wrote to memory of 1432 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 84 PID 2220 wrote to memory of 4576 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 85 PID 2220 wrote to memory of 4576 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 85 PID 2220 wrote to memory of 4576 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 85 PID 2220 wrote to memory of 1600 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 86 PID 2220 wrote to memory of 1600 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 86 PID 2220 wrote to memory of 1600 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 86 PID 2220 wrote to memory of 4028 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 88 PID 2220 wrote to memory of 4028 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 88 PID 2220 wrote to memory of 4028 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 88 PID 2220 wrote to memory of 2928 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 91 PID 2220 wrote to memory of 2928 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 91 PID 2220 wrote to memory of 2928 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 91 PID 2220 wrote to memory of 4104 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 90 PID 2220 wrote to memory of 4104 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 90 PID 2220 wrote to memory of 4104 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 90 PID 2220 wrote to memory of 648 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 89 PID 2220 wrote to memory of 648 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 89 PID 2220 wrote to memory of 648 2220 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 89 PID 1600 wrote to memory of 1716 1600 cmd.exe 96 PID 1600 wrote to memory of 1716 1600 cmd.exe 96 PID 1600 wrote to memory of 1716 1600 cmd.exe 96 PID 648 wrote to memory of 4648 648 cmd.exe 97 PID 648 wrote to memory of 4648 648 cmd.exe 97 PID 648 wrote to memory of 4648 648 cmd.exe 97 PID 1716 wrote to memory of 1712 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 98 PID 1716 wrote to memory of 1712 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 98 PID 1716 wrote to memory of 1712 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 98 PID 1712 wrote to memory of 1388 1712 cmd.exe 100 PID 1712 wrote to memory of 1388 1712 cmd.exe 100 PID 1712 wrote to memory of 1388 1712 cmd.exe 100 PID 1716 wrote to memory of 2284 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 101 PID 1716 wrote to memory of 2284 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 101 PID 1716 wrote to memory of 2284 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 101 PID 1716 wrote to memory of 724 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 102 PID 1716 wrote to memory of 724 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 102 PID 1716 wrote to memory of 724 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 102 PID 1716 wrote to memory of 4100 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 106 PID 1716 wrote to memory of 4100 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 106 PID 1716 wrote to memory of 4100 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 106 PID 1716 wrote to memory of 2516 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 104 PID 1716 wrote to memory of 2516 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 104 PID 1716 wrote to memory of 2516 1716 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 104 PID 2516 wrote to memory of 1588 2516 cmd.exe 109 PID 2516 wrote to memory of 1588 2516 cmd.exe 109 PID 2516 wrote to memory of 1588 2516 cmd.exe 109 PID 1388 wrote to memory of 3144 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 110 PID 1388 wrote to memory of 3144 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 110 PID 1388 wrote to memory of 3144 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 110 PID 3144 wrote to memory of 2528 3144 cmd.exe 112 PID 3144 wrote to memory of 2528 3144 cmd.exe 112 PID 3144 wrote to memory of 2528 3144 cmd.exe 112 PID 1388 wrote to memory of 2492 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 116 PID 1388 wrote to memory of 2492 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 116 PID 1388 wrote to memory of 2492 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 116 PID 1388 wrote to memory of 1772 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 115 PID 1388 wrote to memory of 1772 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 115 PID 1388 wrote to memory of 1772 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 115 PID 1388 wrote to memory of 1616 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 114 PID 1388 wrote to memory of 1616 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 114 PID 1388 wrote to memory of 1616 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 114 PID 1388 wrote to memory of 1308 1388 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe 113 -
System policy modification 1 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\SaMUsAgQ\jmEkokEk.exe"C:\Users\Admin\SaMUsAgQ\jmEkokEk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1432
-
-
C:\ProgramData\qQwYAwMc\dUQcAYgc.exe"C:\ProgramData\qQwYAwMc\dUQcAYgc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"8⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"10⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"12⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"14⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"16⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"18⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"20⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"22⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"24⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"26⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"28⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"30⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"32⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock33⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"34⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock35⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"36⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock37⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"38⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock39⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"40⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock41⤵PID:1416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"42⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock43⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"44⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock45⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"46⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock47⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"48⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock49⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"50⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock51⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"52⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock53⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"54⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock55⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"56⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock57⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"58⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock59⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"60⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock61⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"62⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock63⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"64⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock65⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"66⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock67⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"68⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock69⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"70⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock71⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"72⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock73⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"74⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock75⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"76⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock77⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"78⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock79⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"80⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock81⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"82⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock83⤵PID:560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"84⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock85⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"86⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock87⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"88⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock89⤵PID:3152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"90⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock91⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"92⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock93⤵PID:3612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"94⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock95⤵PID:4220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"96⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock97⤵PID:4504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"98⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock99⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"100⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock101⤵PID:1436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"102⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock103⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"104⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock105⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"106⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock107⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"108⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock109⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"110⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock111⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"112⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock113⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"114⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock115⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"116⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock117⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"118⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock119⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"120⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock121⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-02-13_570b3eeade0b3f10847a0ae04c1f267d_virlock"122⤵PID:4204
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-