Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:07
Static task
static1
Behavioral task
behavioral1
Sample
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe
-
Size
204KB
-
MD5
70b44f5eef4df1621e863e49c01402c5
-
SHA1
dd3b50bf475c08766a72f668228d940f6ccdbb9f
-
SHA256
338148932ece144ab27de71918a610fbf2c249b0f7b673277e9ef0cd67b27b18
-
SHA512
d19b3ae5899aa07fa7179ec9df62368a3c62f28ed52f02b266c4e47f2aeea4e77bfcdc2a4218faaaa2511ea330f7faa64f7cf6fdb33e1059319ba6424e74e002
-
SSDEEP
3072:IWsoKycRpXJ1TH/feRWJhcnYajlENhhyiP8Gbv7WwZ7:hBKL51TH/fPhKYajlENDy0vKwZ7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GYkoQQoI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation GYkoQQoI.exe -
Executes dropped EXE 2 IoCs
Processes:
TqwogsoU.exeGYkoQQoI.exepid process 3680 TqwogsoU.exe 2796 GYkoQQoI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
GYkoQQoI.exeTqwogsoU.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GYkoQQoI.exe = "C:\\ProgramData\\FQMYMYwM\\GYkoQQoI.exe" GYkoQQoI.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TqwogsoU.exe = "C:\\Users\\Admin\\LyIkIIUE\\TqwogsoU.exe" TqwogsoU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OYskwcos.exe = "C:\\Users\\Admin\\VQcQYcIc\\OYskwcos.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PyQgcwkc.exe = "C:\\ProgramData\\uUYsUYsY\\PyQgcwkc.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OYskwcos.exe = "C:\\Users\\Admin\\VQcQYcIc\\OYskwcos.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\PyQgcwkc.exe = "C:\\ProgramData\\uUYsUYsY\\PyQgcwkc.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TqwogsoU.exe = "C:\\Users\\Admin\\LyIkIIUE\\TqwogsoU.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GYkoQQoI.exe = "C:\\ProgramData\\FQMYMYwM\\GYkoQQoI.exe" 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe -
Drops file in System32 directory 2 IoCs
Processes:
GYkoQQoI.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe GYkoQQoI.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe GYkoQQoI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1172 4260 WerFault.exe OYskwcos.exe 1684 3412 WerFault.exe PyQgcwkc.exe 4388 2112 WerFault.exe OYskwcos.exe 2920 2436 WerFault.exe PyQgcwkc.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 3220 reg.exe 3188 reg.exe 2732 reg.exe 3500 reg.exe 3116 1964 reg.exe 1436 reg.exe 2180 reg.exe 4976 reg.exe 3264 716 4160 4368 reg.exe 2180 2436 1924 reg.exe 1992 reg.exe 4000 reg.exe 3952 2912 reg.exe 5048 reg.exe 3484 3684 reg.exe 4864 reg.exe 1196 reg.exe 3392 reg.exe 4316 reg.exe 8 reg.exe 1924 reg.exe 368 reg.exe 4708 reg.exe 716 reg.exe 1724 716 reg.exe 3588 reg.exe 5100 4376 reg.exe 3536 reg.exe 3356 reg.exe 1760 reg.exe 4816 1000 reg.exe 3836 reg.exe 4656 3672 reg.exe 1148 reg.exe 4552 reg.exe 3484 reg.exe 216 reg.exe 3204 reg.exe 4796 reg.exe 2468 reg.exe 5100 reg.exe 3952 reg.exe 2140 reg.exe 384 1012 reg.exe 968 reg.exe 4580 reg.exe 4160 reg.exe 2132 5000 reg.exe 1860 reg.exe 3940 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.exepid process 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2572 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2732 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2732 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2732 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2732 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3452 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3324 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3324 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3324 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3324 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 752 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 752 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 752 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 752 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 4544 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 4544 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 4544 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 4544 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 2988 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1176 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1176 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1176 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1176 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3764 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3764 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3764 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 3764 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 1672 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 924 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 924 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 924 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe 924 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
GYkoQQoI.exepid process 2796 GYkoQQoI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
GYkoQQoI.exepid process 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe 2796 GYkoQQoI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024052270b44f5eef4df1621e863e49c01402c5virlock.execmd.execmd.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.execmd.execmd.exe2024052270b44f5eef4df1621e863e49c01402c5virlock.execmd.exedescription pid process target process PID 1760 wrote to memory of 3680 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe TqwogsoU.exe PID 1760 wrote to memory of 3680 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe TqwogsoU.exe PID 1760 wrote to memory of 3680 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe TqwogsoU.exe PID 1760 wrote to memory of 2796 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe GYkoQQoI.exe PID 1760 wrote to memory of 2796 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe GYkoQQoI.exe PID 1760 wrote to memory of 2796 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe GYkoQQoI.exe PID 1760 wrote to memory of 3452 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1760 wrote to memory of 3452 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1760 wrote to memory of 3452 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1760 wrote to memory of 536 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 536 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 536 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4504 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4504 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4504 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4384 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4384 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 4384 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 1760 wrote to memory of 1056 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1760 wrote to memory of 1056 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 1760 wrote to memory of 1056 1760 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 3452 wrote to memory of 2912 3452 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3452 wrote to memory of 2912 3452 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3452 wrote to memory of 2912 3452 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 1056 wrote to memory of 4016 1056 cmd.exe cscript.exe PID 1056 wrote to memory of 4016 1056 cmd.exe cscript.exe PID 1056 wrote to memory of 4016 1056 cmd.exe cscript.exe PID 2912 wrote to memory of 3828 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2912 wrote to memory of 3828 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2912 wrote to memory of 3828 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 3828 wrote to memory of 724 3828 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3828 wrote to memory of 724 3828 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3828 wrote to memory of 724 3828 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 2912 wrote to memory of 1012 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 1012 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 1012 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4864 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4864 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4864 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4272 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4272 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 4272 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 2912 wrote to memory of 3136 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2912 wrote to memory of 3136 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 2912 wrote to memory of 3136 2912 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 3136 wrote to memory of 408 3136 cmd.exe cscript.exe PID 3136 wrote to memory of 408 3136 cmd.exe cscript.exe PID 3136 wrote to memory of 408 3136 cmd.exe cscript.exe PID 724 wrote to memory of 3508 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 724 wrote to memory of 3508 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 724 wrote to memory of 3508 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe PID 3508 wrote to memory of 2572 3508 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3508 wrote to memory of 2572 3508 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 3508 wrote to memory of 2572 3508 cmd.exe 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe PID 724 wrote to memory of 1692 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 1692 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 1692 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 4204 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 4204 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 4204 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 3608 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 3608 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 3608 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe reg.exe PID 724 wrote to memory of 816 724 2024052270b44f5eef4df1621e863e49c01402c5virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\LyIkIIUE\TqwogsoU.exe"C:\Users\Admin\LyIkIIUE\TqwogsoU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3680
-
-
C:\ProgramData\FQMYMYwM\GYkoQQoI.exe"C:\ProgramData\FQMYMYwM\GYkoQQoI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"8⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"10⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"12⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"14⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"16⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"18⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"20⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"22⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"24⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"26⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"28⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"30⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"32⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock33⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"34⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock35⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"36⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock37⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"38⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock39⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"40⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock41⤵PID:3248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"42⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock43⤵PID:1812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"44⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock45⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"46⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock47⤵PID:2588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"48⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock49⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"50⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock51⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"52⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock53⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"54⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock55⤵PID:3204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"56⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock57⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"58⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock59⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"60⤵PID:436
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock61⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"62⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock63⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"64⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock65⤵PID:452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"66⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock67⤵PID:1752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"68⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock69⤵PID:1428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"70⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock71⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"72⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock73⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"74⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock75⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"76⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock77⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"78⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock79⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"80⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock81⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"82⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock83⤵PID:1924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"84⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock85⤵PID:1860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"86⤵PID:4724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock87⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"88⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock89⤵PID:2088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"90⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock91⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"92⤵PID:1176
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock93⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"94⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock95⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"96⤵PID:2720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock97⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"98⤵PID:2920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock99⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"100⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock101⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"102⤵PID:4724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock103⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"104⤵PID:2224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock105⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"106⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock107⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"108⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock109⤵PID:2696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"110⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock111⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"112⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock113⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"114⤵PID:4368
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock115⤵PID:3128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"116⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock117⤵PID:2588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"118⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock119⤵PID:4600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"120⤵PID:4764
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock.exeC:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock121⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024052270b44f5eef4df1621e863e49c01402c5virlock"122⤵PID:4560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-