Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
-
Size
202KB
-
MD5
6db37117e8c0e5aeba603cbb6b97b82c
-
SHA1
f81aa8cec4472771da6a97eab56f9bced6fb4ec3
-
SHA256
baf8a44716c5f3cdceba80c4829c1dfe1cf85f70738ed7751300c94399a466f1
-
SHA512
c6886cd3de301f9bcc540a9ff9acbb95a196a8c9ec69023e1281d7033f1fd12a6623a665b5878f246cf56e04e8e3275b72cf03f814d2a22ee78a1518f0c020ff
-
SSDEEP
3072:290rs48O0lrcIX5i7RlDRvo2GBmQIg51uHR69+tcliXrOyswHu5TTxU28r4/:26ErLpiHZo2+mng51uHGOWiXrU6B4/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
PqogIYMY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation PqogIYMY.exe -
Executes dropped EXE 2 IoCs
Processes:
PqogIYMY.exeLywoYoEI.exepid process 4708 PqogIYMY.exe 1812 LywoYoEI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exePqogIYMY.exeLywoYoEI.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SOUwgEog.exe = "C:\\Users\\Admin\\UEEUcock\\SOUwgEog.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oIIoEIco.exe = "C:\\ProgramData\\BkcUEIYY\\oIIoEIco.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PqogIYMY.exe = "C:\\Users\\Admin\\fsIowIsU\\PqogIYMY.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LywoYoEI.exe = "C:\\ProgramData\\vMMksUoM\\LywoYoEI.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PqogIYMY.exe = "C:\\Users\\Admin\\fsIowIsU\\PqogIYMY.exe" PqogIYMY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LywoYoEI.exe = "C:\\ProgramData\\vMMksUoM\\LywoYoEI.exe" LywoYoEI.exe -
Drops file in System32 directory 2 IoCs
Processes:
PqogIYMY.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe PqogIYMY.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe PqogIYMY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 724 3228 WerFault.exe oIIoEIco.exe 1564 2240 WerFault.exe SOUwgEog.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4532 reg.exe 4376 reg.exe 2672 reg.exe 3300 1560 4328 reg.exe 3660 reg.exe 2480 3820 3004 3588 reg.exe 1260 reg.exe 2876 reg.exe 3120 reg.exe 3844 reg.exe 1236 reg.exe 1048 reg.exe 944 reg.exe 2652 reg.exe 2196 reg.exe 676 reg.exe 2544 reg.exe 3452 776 reg.exe 2580 reg.exe 4564 reg.exe 3808 reg.exe 1424 2896 2116 reg.exe 3848 reg.exe 2648 reg.exe 3608 reg.exe 4132 reg.exe 2820 reg.exe 544 reg.exe 3228 3260 reg.exe 2432 reg.exe 3960 1128 reg.exe 4544 reg.exe 4084 reg.exe 532 reg.exe 4552 reg.exe 2224 reg.exe 3260 reg.exe 1564 reg.exe 1488 reg.exe 1252 reg.exe 1864 4996 reg.exe 4188 reg.exe 1560 reg.exe 2936 reg.exe 4856 reg.exe 4880 reg.exe 4860 reg.exe 3724 reg.exe 3060 reg.exe 3496 reg.exe 4660 reg.exe 4760 2224 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exepid process 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1440 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1440 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1440 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1440 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4812 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4812 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4812 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4812 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4380 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4380 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4380 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4380 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2476 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2476 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2476 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2476 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2344 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2344 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2344 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2344 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1552 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1552 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1552 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1552 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4324 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4324 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4324 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4324 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4868 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4868 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4868 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4868 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4448 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4448 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4448 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4448 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4640 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4640 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4640 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 4640 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2944 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2944 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2944 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2944 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2744 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2744 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2744 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2744 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PqogIYMY.exepid process 4708 PqogIYMY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
PqogIYMY.exepid process 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe 4708 PqogIYMY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.execmd.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.execmd.execmd.execmd.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.execmd.exedescription pid process target process PID 1816 wrote to memory of 4708 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PqogIYMY.exe PID 1816 wrote to memory of 4708 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PqogIYMY.exe PID 1816 wrote to memory of 4708 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PqogIYMY.exe PID 1816 wrote to memory of 1812 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe LywoYoEI.exe PID 1816 wrote to memory of 1812 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe LywoYoEI.exe PID 1816 wrote to memory of 1812 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe LywoYoEI.exe PID 1816 wrote to memory of 3852 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1816 wrote to memory of 3852 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1816 wrote to memory of 3852 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3852 wrote to memory of 3876 3852 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 3852 wrote to memory of 3876 3852 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 3852 wrote to memory of 3876 3852 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1816 wrote to memory of 3980 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 3980 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 3980 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 4328 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 4328 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 4328 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 3984 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 3984 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 3984 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1816 wrote to memory of 388 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1816 wrote to memory of 388 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1816 wrote to memory of 388 1816 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3876 wrote to memory of 1716 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3876 wrote to memory of 1716 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3876 wrote to memory of 1716 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 388 wrote to memory of 2100 388 cmd.exe cscript.exe PID 388 wrote to memory of 2100 388 cmd.exe cscript.exe PID 388 wrote to memory of 2100 388 cmd.exe cscript.exe PID 3876 wrote to memory of 1116 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 1116 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 1116 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 4612 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 4612 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 4612 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 3416 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 3416 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 3416 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 3876 wrote to memory of 1620 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3876 wrote to memory of 1620 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 3876 wrote to memory of 1620 3876 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1716 wrote to memory of 5108 1716 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1716 wrote to memory of 5108 1716 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1716 wrote to memory of 5108 1716 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1620 wrote to memory of 5008 1620 cmd.exe cscript.exe PID 1620 wrote to memory of 5008 1620 cmd.exe cscript.exe PID 1620 wrote to memory of 5008 1620 cmd.exe cscript.exe PID 5108 wrote to memory of 1724 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 5108 wrote to memory of 1724 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 5108 wrote to memory of 1724 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1724 wrote to memory of 1440 1724 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1724 wrote to memory of 1440 1724 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1724 wrote to memory of 1440 1724 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 5108 wrote to memory of 2536 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 2536 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 2536 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 3696 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 3696 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 3696 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 4416 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 4416 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 4416 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 5108 wrote to memory of 4636 5108 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\fsIowIsU\PqogIYMY.exe"C:\Users\Admin\fsIowIsU\PqogIYMY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4708
-
-
C:\ProgramData\vMMksUoM\LywoYoEI.exe"C:\ProgramData\vMMksUoM\LywoYoEI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"8⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"10⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"12⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"14⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"16⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"18⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"20⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"22⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"24⤵PID:3344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"26⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"28⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"30⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"32⤵PID:3844
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock33⤵PID:392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"34⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock35⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"36⤵PID:4760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:4432
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock37⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"38⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock39⤵PID:4052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"40⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock41⤵PID:2056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"42⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock43⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"44⤵PID:2908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:4644
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock45⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"46⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock47⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"48⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock49⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"50⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock51⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"52⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock53⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"54⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock55⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"56⤵PID:4688
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock57⤵PID:744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"58⤵PID:2344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4888
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock59⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"60⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock61⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"62⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock63⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"64⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock65⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"66⤵PID:3808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock67⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"68⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock69⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"70⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock71⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"72⤵PID:1664
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:4200
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock73⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"74⤵PID:1716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock75⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"76⤵PID:3260
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock77⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"78⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock79⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"80⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock81⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"82⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock83⤵PID:4244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"84⤵PID:548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:1044
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock85⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"86⤵PID:3520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock87⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"88⤵PID:4656
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:3164
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock89⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"90⤵PID:2200
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock91⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"92⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock93⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"94⤵PID:4992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:3588
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock95⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"96⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock97⤵PID:4656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"98⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock99⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"100⤵PID:2536
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock101⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"102⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock103⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"104⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock105⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"106⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock107⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"108⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock109⤵PID:808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"110⤵PID:5000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3520
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock111⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"112⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock113⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"114⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock115⤵PID:2908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"116⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock117⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"118⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock119⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"120⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock121⤵PID:932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"122⤵PID:3188
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-