Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 15:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe
-
Size
118KB
-
MD5
cf32ba9b457ae5bfdb7f3a5ed546ec85
-
SHA1
34407958aba6bb692b0e31df1e07dfefb3ca8000
-
SHA256
928d576ac3f759e3bb011f0f2fc043d0e5bb6b7b73d4a9ef6788b0d815755eb7
-
SHA512
bef409e20c1539e085164574943d916d1d13139de8b17c4e7b89d7447b0bc746e9f493c4abf5c39a7605079bce50a24f9c92bdd681718c9e41866c7351f45dff
-
SSDEEP
1536:8xrSlcdFGiAmDK2PBBnIhD4pIe+0OByHUWREr0+S9tfG3d5j:81Kiv9DK2JtpIehOo0WREr0+x
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (88) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation qKkQIosg.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ygUEcIgI.exe -
Executes dropped EXE 2 IoCs
pid Process 1884 qKkQIosg.exe 3836 ygUEcIgI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qKkQIosg.exe = "C:\\Users\\Admin\\ZqIcgoEg\\qKkQIosg.exe" 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygUEcIgI.exe = "C:\\ProgramData\\wOsIEwMo\\ygUEcIgI.exe" 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qKkQIosg.exe = "C:\\Users\\Admin\\ZqIcgoEg\\qKkQIosg.exe" qKkQIosg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ygUEcIgI.exe = "C:\\ProgramData\\wOsIEwMo\\ygUEcIgI.exe" ygUEcIgI.exe Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aiEAEQoY.exe = "C:\\Users\\Admin\\BeoMYskU\\aiEAEQoY.exe" 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CIggwkgk.exe = "C:\\ProgramData\\EQMUIgko\\CIggwkgk.exe" 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe qKkQIosg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4800 1900 WerFault.exe 150 1040 440 WerFault.exe 151 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1240 reg.exe 3608 reg.exe 1040 reg.exe 4412 reg.exe 436 reg.exe 2920 reg.exe 3284 reg.exe 2240 reg.exe 1008 reg.exe 1044 reg.exe 4952 reg.exe 4568 reg.exe 3656 reg.exe 2796 reg.exe 4612 reg.exe 5020 reg.exe 1244 reg.exe 2968 reg.exe 1524 reg.exe 2868 reg.exe 1808 reg.exe 4948 reg.exe 1744 reg.exe 1900 reg.exe 4384 reg.exe 4084 reg.exe 4828 reg.exe 532 reg.exe 3264 reg.exe 4008 reg.exe 3160 reg.exe 2072 reg.exe 4168 reg.exe 3512 reg.exe 2092 reg.exe 1636 reg.exe 3264 reg.exe 1140 reg.exe 2072 reg.exe 3600 reg.exe 5040 reg.exe 392 reg.exe 2560 reg.exe 816 reg.exe 3096 reg.exe 3656 reg.exe 2796 reg.exe 2036 reg.exe 1744 reg.exe 1600 reg.exe 1496 reg.exe 5004 reg.exe 4616 reg.exe 1192 reg.exe 4984 reg.exe 1456 reg.exe 4752 reg.exe 4760 reg.exe 2752 reg.exe 3016 reg.exe 4988 reg.exe 4752 reg.exe 3736 reg.exe 4212 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3876 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3876 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3876 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3876 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1808 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1808 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1808 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1808 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3776 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3776 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3776 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3776 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1488 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1488 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1488 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1488 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3984 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3984 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3984 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 3984 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1432 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1432 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1432 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1432 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4768 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4768 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4768 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4768 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1640 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1640 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1640 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1640 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4684 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4684 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4684 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 4684 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1736 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1736 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1736 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1736 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1720 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1720 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1720 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1720 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2004 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2004 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2004 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 2004 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1968 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1968 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1968 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 1968 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1884 qKkQIosg.exe 3836 ygUEcIgI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe 1884 qKkQIosg.exe 3836 ygUEcIgI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 1884 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 87 PID 4892 wrote to memory of 1884 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 87 PID 4892 wrote to memory of 1884 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 87 PID 4892 wrote to memory of 3836 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 88 PID 4892 wrote to memory of 3836 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 88 PID 4892 wrote to memory of 3836 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 88 PID 4892 wrote to memory of 2904 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 89 PID 4892 wrote to memory of 2904 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 89 PID 4892 wrote to memory of 2904 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 89 PID 4892 wrote to memory of 1332 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 91 PID 4892 wrote to memory of 1332 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 91 PID 4892 wrote to memory of 1332 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 91 PID 4892 wrote to memory of 3672 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 92 PID 4892 wrote to memory of 3672 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 92 PID 4892 wrote to memory of 3672 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 92 PID 4892 wrote to memory of 2868 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 93 PID 4892 wrote to memory of 2868 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 93 PID 4892 wrote to memory of 2868 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 93 PID 4892 wrote to memory of 3916 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 94 PID 4892 wrote to memory of 3916 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 94 PID 4892 wrote to memory of 3916 4892 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 94 PID 2904 wrote to memory of 2428 2904 cmd.exe 99 PID 2904 wrote to memory of 2428 2904 cmd.exe 99 PID 2904 wrote to memory of 2428 2904 cmd.exe 99 PID 3916 wrote to memory of 4176 3916 cmd.exe 100 PID 3916 wrote to memory of 4176 3916 cmd.exe 100 PID 3916 wrote to memory of 4176 3916 cmd.exe 100 PID 2428 wrote to memory of 4012 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 102 PID 2428 wrote to memory of 4012 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 102 PID 2428 wrote to memory of 4012 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 102 PID 4012 wrote to memory of 3676 4012 cmd.exe 104 PID 4012 wrote to memory of 3676 4012 cmd.exe 104 PID 4012 wrote to memory of 3676 4012 cmd.exe 104 PID 2428 wrote to memory of 3064 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 105 PID 2428 wrote to memory of 3064 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 105 PID 2428 wrote to memory of 3064 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 105 PID 2428 wrote to memory of 1728 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 106 PID 2428 wrote to memory of 1728 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 106 PID 2428 wrote to memory of 1728 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 106 PID 2428 wrote to memory of 4984 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 107 PID 2428 wrote to memory of 4984 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 107 PID 2428 wrote to memory of 4984 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 107 PID 2428 wrote to memory of 4040 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 108 PID 2428 wrote to memory of 4040 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 108 PID 2428 wrote to memory of 4040 2428 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 108 PID 4040 wrote to memory of 1992 4040 cmd.exe 113 PID 4040 wrote to memory of 1992 4040 cmd.exe 113 PID 4040 wrote to memory of 1992 4040 cmd.exe 113 PID 3676 wrote to memory of 4756 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 114 PID 3676 wrote to memory of 4756 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 114 PID 3676 wrote to memory of 4756 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 114 PID 4756 wrote to memory of 3876 4756 cmd.exe 116 PID 4756 wrote to memory of 3876 4756 cmd.exe 116 PID 4756 wrote to memory of 3876 4756 cmd.exe 116 PID 3676 wrote to memory of 3736 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 117 PID 3676 wrote to memory of 3736 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 117 PID 3676 wrote to memory of 3736 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 117 PID 3676 wrote to memory of 2632 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 118 PID 3676 wrote to memory of 2632 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 118 PID 3676 wrote to memory of 2632 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 118 PID 3676 wrote to memory of 4840 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 119 PID 3676 wrote to memory of 4840 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 119 PID 3676 wrote to memory of 4840 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 119 PID 3676 wrote to memory of 2968 3676 2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\ZqIcgoEg\qKkQIosg.exe"C:\Users\Admin\ZqIcgoEg\qKkQIosg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1884
-
-
C:\ProgramData\wOsIEwMo\ygUEcIgI.exe"C:\ProgramData\wOsIEwMo\ygUEcIgI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3836
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"8⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"10⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock11⤵
- Adds Run key to start application
PID:4692 -
C:\Users\Admin\BeoMYskU\aiEAEQoY.exe"C:\Users\Admin\BeoMYskU\aiEAEQoY.exe"12⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 22813⤵
- Program crash
PID:4800
-
-
-
C:\ProgramData\EQMUIgko\CIggwkgk.exe"C:\ProgramData\EQMUIgko\CIggwkgk.exe"12⤵PID:440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 440 -s 22413⤵
- Program crash
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"12⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"14⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"16⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"18⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"20⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"22⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"24⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"26⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"28⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"30⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"32⤵PID:5020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"34⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock35⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"36⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock37⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"38⤵PID:232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock39⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"40⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock41⤵PID:1100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"42⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock43⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"44⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock45⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"46⤵PID:3020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock47⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"48⤵PID:2076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock49⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"50⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock51⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"52⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock53⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"54⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock55⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"56⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock57⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"58⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock59⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"60⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock61⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"62⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock63⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"64⤵PID:1900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV165⤵PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock65⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"66⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock67⤵PID:4844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"68⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock69⤵PID:2632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"70⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock71⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"72⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock73⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"74⤵PID:3132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock75⤵PID:64
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"76⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock77⤵PID:1512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"78⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock79⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"80⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock81⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"82⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock83⤵PID:2088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"84⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock85⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"86⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock87⤵PID:2656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"88⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock89⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"90⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock91⤵PID:4180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"92⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock93⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"94⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock95⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"96⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock97⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"98⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock99⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"100⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock101⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"102⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock103⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"104⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock105⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"106⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock107⤵PID:4720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"108⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock109⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"110⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock111⤵PID:2620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"112⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock113⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"114⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock115⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"116⤵PID:4316
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock117⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"118⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock119⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"120⤵PID:2588
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock121⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_cf32ba9b457ae5bfdb7f3a5ed546ec85_virlock"122⤵PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-