Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe
-
Size
138KB
-
MD5
748f42470b3dfdf0272bf821ee3c59c7
-
SHA1
11e1bf1b8d7c8bc0f7f1f4cd96096ec163119cae
-
SHA256
df61cc0d6f815725dd58ef09c617ed92a5dd94ad4d7614d1b4bfd8cd63f171fe
-
SHA512
683ab227a50bd7bfeb395bfdbb2fb422d9db572e7ad379ed3e0d0e221e28d0708b6eba08d37f325f0f4835fd8e943b21a6dbb76e552f006c66ca2643bede91b3
-
SSDEEP
3072:noDaOr6Ey73oPTC1WVZxkcSHEGb3gDoFrkd2DQUDaxU/:noDaOrRg3oPyWFkcSHDQDo1DJmW/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (93) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\Control Panel\International\Geo\Nation EksocMIU.exe -
Executes dropped EXE 3 IoCs
pid Process 912 EksocMIU.exe 2900 OWEUQsgU.exe 1768 yYAIgsIk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yYAIgsIk.exe = "C:\\ProgramData\\wyAQMQoQ\\yYAIgsIk.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QGIAAscM.exe = "C:\\Users\\Admin\\hYsMQwYU\\QGIAAscM.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yYAIgsIk.exe = "C:\\ProgramData\\wyAQMQoQ\\yYAIgsIk.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EksocMIU.exe = "C:\\Users\\Admin\\hkAkAwkM\\EksocMIU.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OWEUQsgU.exe = "C:\\ProgramData\\csIogkYk\\OWEUQsgU.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EksocMIU.exe = "C:\\Users\\Admin\\hkAkAwkM\\EksocMIU.exe" EksocMIU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OWEUQsgU.exe = "C:\\ProgramData\\csIogkYk\\OWEUQsgU.exe" OWEUQsgU.exe Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QGIAAscM.exe = "C:\\Users\\Admin\\hYsMQwYU\\QGIAAscM.exe" 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3948 4976 WerFault.exe 451 4784 3888 WerFault.exe 450 3360 2944 WerFault.exe 684 1048 1768 WerFault.exe 686 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1596 reg.exe 4684 reg.exe 2020 reg.exe 2328 reg.exe 4612 reg.exe 4184 reg.exe 4204 reg.exe 1840 reg.exe 2372 reg.exe 2668 reg.exe 1444 reg.exe 1768 reg.exe 4508 reg.exe 2940 reg.exe 2928 reg.exe 2940 reg.exe 3888 reg.exe 3940 reg.exe 4124 reg.exe 4088 reg.exe 2548 reg.exe 1092 reg.exe 2380 reg.exe 1484 reg.exe 4388 reg.exe 5052 reg.exe 4136 reg.exe 1452 reg.exe 1448 reg.exe 2884 reg.exe 100 reg.exe 4828 reg.exe 2944 reg.exe 2208 reg.exe 4968 reg.exe 3708 reg.exe 3572 reg.exe 1604 reg.exe 4580 reg.exe 1412 reg.exe 1256 reg.exe 100 reg.exe 312 reg.exe 4276 reg.exe 4728 reg.exe 824 reg.exe 692 reg.exe 2444 reg.exe 2072 reg.exe 3388 reg.exe 4464 reg.exe 1860 reg.exe 2784 reg.exe 5036 reg.exe 2100 reg.exe 3560 reg.exe 2572 reg.exe 1728 reg.exe 1096 reg.exe 3356 reg.exe 4088 reg.exe 4588 reg.exe 3572 reg.exe 4616 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2244 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2244 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2244 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2244 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1768 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1768 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1768 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1768 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4048 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4048 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4048 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4048 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2320 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2320 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2320 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 2320 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3560 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3560 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3560 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3560 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5080 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5080 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5080 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 5080 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3828 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3828 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3828 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3828 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4508 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4508 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4508 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4508 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4704 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4704 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4704 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4704 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1028 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1028 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1028 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 1028 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4792 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4792 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4792 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4792 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3356 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3356 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3356 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 3356 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4748 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4748 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4748 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 4748 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 912 EksocMIU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe 912 EksocMIU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3156 wrote to memory of 912 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 83 PID 3156 wrote to memory of 912 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 83 PID 3156 wrote to memory of 912 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 83 PID 3156 wrote to memory of 2900 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 84 PID 3156 wrote to memory of 2900 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 84 PID 3156 wrote to memory of 2900 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 84 PID 3156 wrote to memory of 1004 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 85 PID 3156 wrote to memory of 1004 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 85 PID 3156 wrote to memory of 1004 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 85 PID 3156 wrote to memory of 2980 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 87 PID 3156 wrote to memory of 2980 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 87 PID 3156 wrote to memory of 2980 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 87 PID 3156 wrote to memory of 392 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 88 PID 3156 wrote to memory of 392 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 88 PID 3156 wrote to memory of 392 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 88 PID 3156 wrote to memory of 4492 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 89 PID 3156 wrote to memory of 4492 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 89 PID 3156 wrote to memory of 4492 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 89 PID 3156 wrote to memory of 4964 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 91 PID 3156 wrote to memory of 4964 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 91 PID 3156 wrote to memory of 4964 3156 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 91 PID 1004 wrote to memory of 1096 1004 cmd.exe 95 PID 1004 wrote to memory of 1096 1004 cmd.exe 95 PID 1004 wrote to memory of 1096 1004 cmd.exe 95 PID 1096 wrote to memory of 1452 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 96 PID 1096 wrote to memory of 1452 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 96 PID 1096 wrote to memory of 1452 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 96 PID 4964 wrote to memory of 2072 4964 cmd.exe 98 PID 4964 wrote to memory of 2072 4964 cmd.exe 98 PID 4964 wrote to memory of 2072 4964 cmd.exe 98 PID 1452 wrote to memory of 5032 1452 cmd.exe 99 PID 1452 wrote to memory of 5032 1452 cmd.exe 99 PID 1452 wrote to memory of 5032 1452 cmd.exe 99 PID 1096 wrote to memory of 220 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 100 PID 1096 wrote to memory of 220 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 100 PID 1096 wrote to memory of 220 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 100 PID 1096 wrote to memory of 1596 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 101 PID 1096 wrote to memory of 1596 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 101 PID 1096 wrote to memory of 1596 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 101 PID 1096 wrote to memory of 4552 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 102 PID 1096 wrote to memory of 4552 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 102 PID 1096 wrote to memory of 4552 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 102 PID 1096 wrote to memory of 100 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 103 PID 1096 wrote to memory of 100 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 103 PID 1096 wrote to memory of 100 1096 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 103 PID 100 wrote to memory of 4944 100 cmd.exe 163 PID 100 wrote to memory of 4944 100 cmd.exe 163 PID 100 wrote to memory of 4944 100 cmd.exe 163 PID 5032 wrote to memory of 4052 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 109 PID 5032 wrote to memory of 4052 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 109 PID 5032 wrote to memory of 4052 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 109 PID 5032 wrote to memory of 1604 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 111 PID 5032 wrote to memory of 1604 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 111 PID 5032 wrote to memory of 1604 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 111 PID 5032 wrote to memory of 1256 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 112 PID 5032 wrote to memory of 1256 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 112 PID 5032 wrote to memory of 1256 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 112 PID 5032 wrote to memory of 3020 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 113 PID 5032 wrote to memory of 3020 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 113 PID 5032 wrote to memory of 3020 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 113 PID 5032 wrote to memory of 1852 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 114 PID 5032 wrote to memory of 1852 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 114 PID 5032 wrote to memory of 1852 5032 2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe 114 PID 4052 wrote to memory of 2244 4052 cmd.exe 179
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\hkAkAwkM\EksocMIU.exe"C:\Users\Admin\hkAkAwkM\EksocMIU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:912
-
-
C:\ProgramData\csIogkYk\OWEUQsgU.exe"C:\ProgramData\csIogkYk\OWEUQsgU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"8⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"10⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"12⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"14⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"16⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"18⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"20⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"22⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"24⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"26⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"28⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"30⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"32⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock33⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"34⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock35⤵PID:1092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"36⤵PID:1264
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock37⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"38⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock39⤵PID:2356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"40⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock41⤵PID:4152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"42⤵PID:2784
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:1556
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock43⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"44⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock45⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"46⤵PID:992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock47⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"48⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock49⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"50⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock51⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"52⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock53⤵PID:2244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"54⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock55⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"56⤵PID:2804
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock57⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"58⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock59⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"60⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock61⤵
- Adds Run key to start application
PID:4868 -
C:\Users\Admin\hYsMQwYU\QGIAAscM.exe"C:\Users\Admin\hYsMQwYU\QGIAAscM.exe"62⤵PID:3888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 22463⤵
- Program crash
PID:4784
-
-
-
C:\ProgramData\wyAQMQoQ\yYAIgsIk.exe"C:\ProgramData\wyAQMQoQ\yYAIgsIk.exe"62⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 22463⤵
- Program crash
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"62⤵PID:1152
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock63⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"64⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock65⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"66⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock67⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"68⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock69⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"70⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock71⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"72⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock73⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"74⤵PID:228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock75⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"76⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock77⤵PID:4152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"78⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock79⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"80⤵PID:2008
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock81⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"82⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock83⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"84⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock85⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"86⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock87⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"88⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock89⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"90⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock91⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"92⤵PID:1204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock93⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"94⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock95⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"96⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock97⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"98⤵PID:4176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:4600
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock99⤵
- Adds Run key to start application
PID:4868 -
C:\Users\Admin\hYsMQwYU\QGIAAscM.exe"C:\Users\Admin\hYsMQwYU\QGIAAscM.exe"100⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 188101⤵
- Program crash
PID:3360
-
-
-
C:\ProgramData\wyAQMQoQ\yYAIgsIk.exe"C:\ProgramData\wyAQMQoQ\yYAIgsIk.exe"100⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 188101⤵
- Program crash
PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"100⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock101⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"102⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock103⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"104⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock105⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"106⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock107⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"108⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock109⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"110⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock111⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"112⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock113⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"114⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock115⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"116⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock117⤵PID:2996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"118⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock119⤵PID:2324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"120⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock121⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-15_748f42470b3dfdf0272bf821ee3c59c7_virlock"122⤵PID:4444
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-