Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
-
Size
204KB
-
MD5
70b44f5eef4df1621e863e49c01402c5
-
SHA1
dd3b50bf475c08766a72f668228d940f6ccdbb9f
-
SHA256
338148932ece144ab27de71918a610fbf2c249b0f7b673277e9ef0cd67b27b18
-
SHA512
d19b3ae5899aa07fa7179ec9df62368a3c62f28ed52f02b266c4e47f2aeea4e77bfcdc2a4218faaaa2511ea330f7faa64f7cf6fdb33e1059319ba6424e74e002
-
SSDEEP
3072:IWsoKycRpXJ1TH/feRWJhcnYajlENhhyiP8Gbv7WwZ7:hBKL51TH/fPhKYajlENDy0vKwZ7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qwUMcEkc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\International\Geo\Nation qwUMcEkc.exe -
Executes dropped EXE 2 IoCs
Processes:
qwUMcEkc.exeFKgsYoIA.exepid process 2936 qwUMcEkc.exe 2204 FKgsYoIA.exe -
Loads dropped DLL 20 IoCs
Processes:
2024052270b44f5eef4df1621e863e49c01402c5virlock.exeqwUMcEkc.exepid process 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
qwUMcEkc.exeFKgsYoIA.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qwUMcEkc.exe = "C:\\Users\\Admin\\gusYEoUc\\qwUMcEkc.exe" qwUMcEkc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FKgsYoIA.exe = "C:\\ProgramData\\LgoEsUww\\FKgsYoIA.exe" FKgsYoIA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\qwUMcEkc.exe = "C:\\Users\\Admin\\gusYEoUc\\qwUMcEkc.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\FKgsYoIA.exe = "C:\\ProgramData\\LgoEsUww\\FKgsYoIA.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2916 reg.exe 2052 reg.exe 1492 reg.exe 1928 reg.exe 3008 reg.exe 2840 reg.exe 1804 reg.exe 2124 reg.exe 1776 reg.exe 324 reg.exe 2968 reg.exe 624 reg.exe 2304 reg.exe 608 reg.exe 2612 reg.exe 2660 reg.exe 1676 reg.exe 2716 reg.exe 2120 reg.exe 1728 reg.exe 2304 reg.exe 624 reg.exe 1052 reg.exe 608 reg.exe 2076 reg.exe 1960 reg.exe 2560 reg.exe 2280 reg.exe 472 reg.exe 2476 reg.exe 2268 reg.exe 1164 reg.exe 2640 reg.exe 2360 reg.exe 1820 reg.exe 2596 reg.exe 1300 reg.exe 2540 reg.exe 1100 reg.exe 604 reg.exe 2980 reg.exe 2500 reg.exe 2492 reg.exe 1364 reg.exe 2388 reg.exe 2732 reg.exe 688 reg.exe 2240 reg.exe 3008 reg.exe 1612 reg.exe 2616 reg.exe 1856 reg.exe 2600 reg.exe 1544 reg.exe 2616 reg.exe 2640 reg.exe 2184 reg.exe 2172 reg.exe 412 reg.exe 2748 reg.exe 3064 reg.exe 2180 reg.exe 2096 reg.exe 2964 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exepid process 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2792 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2792 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 384 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 384 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 796 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 796 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 628 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 628 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2744 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2744 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2916 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2916 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2116 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2116 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2896 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2896 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1688 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1688 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2500 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2500 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2300 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2300 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2880 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2880 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1776 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1776 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2892 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2892 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2780 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2780 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2980 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2980 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1664 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1664 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1788 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1788 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2676 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2676 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2832 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2832 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1040 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1040 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2964 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2964 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1644 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1644 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2648 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2648 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2772 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2772 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
qwUMcEkc.exepid process 2936 qwUMcEkc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
qwUMcEkc.exepid process 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe 2936 qwUMcEkc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024052270b44f5eef4df1621e863e49c01402c5virlock.execmd.execmd.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.execmd.execmd.exedescription pid process target process PID 2868 wrote to memory of 2936 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe qwUMcEkc.exe PID 2868 wrote to memory of 2936 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe qwUMcEkc.exe PID 2868 wrote to memory of 2936 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe qwUMcEkc.exe PID 2868 wrote to memory of 2936 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe qwUMcEkc.exe PID 2868 wrote to memory of 2204 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe FKgsYoIA.exe PID 2868 wrote to memory of 2204 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe FKgsYoIA.exe PID 2868 wrote to memory of 2204 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe FKgsYoIA.exe PID 2868 wrote to memory of 2204 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe FKgsYoIA.exe PID 2868 wrote to memory of 2736 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2736 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2736 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2736 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2736 wrote to memory of 2600 2736 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2736 wrote to memory of 2600 2736 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2736 wrote to memory of 2600 2736 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2736 wrote to memory of 2600 2736 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2868 wrote to memory of 2576 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2576 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2576 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2576 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2452 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2452 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2452 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2452 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2636 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2636 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2636 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2636 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2868 wrote to memory of 2608 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2608 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2608 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2868 wrote to memory of 2608 2868 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2608 wrote to memory of 2440 2608 cmd.exe cscript.exe PID 2608 wrote to memory of 2440 2608 cmd.exe cscript.exe PID 2608 wrote to memory of 2440 2608 cmd.exe cscript.exe PID 2608 wrote to memory of 2440 2608 cmd.exe cscript.exe PID 2600 wrote to memory of 2776 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 2776 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 2776 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 2776 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2776 wrote to memory of 2792 2776 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2776 wrote to memory of 2792 2776 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2776 wrote to memory of 2792 2776 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2776 wrote to memory of 2792 2776 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2600 wrote to memory of 2916 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2916 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2916 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2916 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 3040 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 3040 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 3040 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 3040 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2388 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2388 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2388 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 2388 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2600 wrote to memory of 1560 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 1560 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 1560 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2600 wrote to memory of 1560 2600 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1560 wrote to memory of 1628 1560 cmd.exe cscript.exe PID 1560 wrote to memory of 1628 1560 cmd.exe cscript.exe PID 1560 wrote to memory of 1628 1560 cmd.exe cscript.exe PID 1560 wrote to memory of 1628 1560 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\gusYEoUc\qwUMcEkc.exe"C:\Users\Admin\gusYEoUc\qwUMcEkc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2936
-
-
C:\ProgramData\LgoEsUww\FKgsYoIA.exe"C:\ProgramData\LgoEsUww\FKgsYoIA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2204
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"6⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"8⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"10⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"12⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"14⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"16⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"18⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"20⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"22⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"24⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"26⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"28⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"30⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"32⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"34⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"36⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"38⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"40⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"42⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"44⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"46⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"48⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"50⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"52⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"54⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"56⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"58⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"60⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"62⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"64⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock65⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"66⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock67⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"68⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock69⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"70⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock71⤵PID:2976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"72⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock73⤵PID:1056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"74⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock75⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"76⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock77⤵PID:1828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"78⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock79⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"80⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock81⤵PID:1868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"82⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock83⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"84⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock85⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"86⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock87⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"88⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock89⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"90⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock91⤵PID:2532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"92⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock93⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"94⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock95⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"96⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock97⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"98⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock99⤵PID:548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"100⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock101⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"102⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock103⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"104⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock105⤵PID:1232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"106⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock107⤵PID:1236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"108⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock109⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock111⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"112⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock113⤵PID:1320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"114⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock115⤵PID:1840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"116⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock117⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"118⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock119⤵PID:632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"120⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock121⤵PID:1492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"122⤵PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-