Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe
-
Size
191KB
-
MD5
270ed136d56c54fbfb1966632b078e73
-
SHA1
ac3844f6244e9526d4ac5767eafdc8164148df14
-
SHA256
8eb1341e2664ecc472650204fdcb53f928340d4c668715c7950871aecd109dca
-
SHA512
32d9740d6f8affe38af5db877a8005d3c380df36a23e38b6e131c37d533a1f84e12dc658ac23f72ef6bf8c970bfa2d070f70f98b8702567cf46fe5f213dde69a
-
SSDEEP
3072:RE9pPhTb7j4r4pQJUNpRXxBd6SsJ8TSZarF7bphNXB0d/bwx5RssBdxVqonXHxXT:RE9pP97j4r4cUNpRXxBd6SsJ8TSZaZ73
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 28 4816 sihclient.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation SeQIsQgk.exe -
Executes dropped EXE 2 IoCs
pid Process 2676 SeQIsQgk.exe 4196 EugIUEIc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeQIsQgk.exe = "C:\\Users\\Admin\\kIkQkMYQ\\SeQIsQgk.exe" SeQIsQgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EugIUEIc.exe = "C:\\ProgramData\\IoQYoIQE\\EugIUEIc.exe" EugIUEIc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SeQIsQgk.exe = "C:\\Users\\Admin\\kIkQkMYQ\\SeQIsQgk.exe" 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EugIUEIc.exe = "C:\\ProgramData\\IoQYoIQE\\EugIUEIc.exe" 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe SeQIsQgk.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe SeQIsQgk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4624 reg.exe 4332 reg.exe 4768 reg.exe 5072 reg.exe 4260 reg.exe 1516 reg.exe 3892 reg.exe 4556 reg.exe 4868 reg.exe 1676 reg.exe 1640 reg.exe 2352 reg.exe 4688 reg.exe 4908 reg.exe 4016 reg.exe 5080 reg.exe 556 reg.exe 2496 reg.exe 1628 Process not Found 1012 reg.exe 4856 reg.exe 1692 reg.exe 3388 reg.exe 4260 reg.exe 872 reg.exe 1256 reg.exe 4912 Process not Found 3312 Process not Found 4412 reg.exe 384 reg.exe 3736 reg.exe 2888 Process not Found 4624 Process not Found 1668 reg.exe 2912 reg.exe 4116 reg.exe 652 reg.exe 1240 reg.exe 4816 Process not Found 4912 reg.exe 2320 reg.exe 4528 reg.exe 4508 reg.exe 4120 reg.exe 1284 reg.exe 652 reg.exe 2560 reg.exe 3948 reg.exe 3584 reg.exe 1632 reg.exe 976 reg.exe 540 reg.exe 4500 reg.exe 3856 reg.exe 1988 reg.exe 4540 Process not Found 3176 reg.exe 1640 reg.exe 4424 reg.exe 2400 reg.exe 824 reg.exe 116 reg.exe 2912 reg.exe 1660 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1624 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1624 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1624 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1624 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3892 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3892 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3892 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3892 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5100 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5100 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5100 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5100 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1000 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1000 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1000 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 1000 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2296 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2296 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2296 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 2296 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4836 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4836 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4836 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4836 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3004 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3004 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3004 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3004 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5056 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5056 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5056 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5056 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4260 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4260 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4260 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4260 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3468 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3468 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3468 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 3468 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4356 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4356 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4356 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 4356 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 752 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 752 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 752 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 752 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5088 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5088 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5088 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 5088 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 SeQIsQgk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe 2676 SeQIsQgk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2676 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 88 PID 3740 wrote to memory of 2676 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 88 PID 3740 wrote to memory of 2676 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 88 PID 3740 wrote to memory of 4196 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 89 PID 3740 wrote to memory of 4196 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 89 PID 3740 wrote to memory of 4196 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 89 PID 3740 wrote to memory of 4948 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 90 PID 3740 wrote to memory of 4948 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 90 PID 3740 wrote to memory of 4948 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 90 PID 4948 wrote to memory of 3424 4948 cmd.exe 92 PID 4948 wrote to memory of 3424 4948 cmd.exe 92 PID 4948 wrote to memory of 3424 4948 cmd.exe 92 PID 3740 wrote to memory of 1692 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 93 PID 3740 wrote to memory of 1692 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 93 PID 3740 wrote to memory of 1692 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 93 PID 3740 wrote to memory of 2400 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 94 PID 3740 wrote to memory of 2400 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 94 PID 3740 wrote to memory of 2400 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 94 PID 3740 wrote to memory of 1112 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 95 PID 3740 wrote to memory of 1112 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 95 PID 3740 wrote to memory of 1112 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 95 PID 3740 wrote to memory of 2180 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 96 PID 3740 wrote to memory of 2180 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 96 PID 3740 wrote to memory of 2180 3740 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 96 PID 2180 wrote to memory of 456 2180 cmd.exe 101 PID 2180 wrote to memory of 456 2180 cmd.exe 101 PID 2180 wrote to memory of 456 2180 cmd.exe 101 PID 3424 wrote to memory of 4340 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 102 PID 3424 wrote to memory of 4340 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 102 PID 3424 wrote to memory of 4340 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 102 PID 4340 wrote to memory of 2920 4340 cmd.exe 104 PID 4340 wrote to memory of 2920 4340 cmd.exe 104 PID 4340 wrote to memory of 2920 4340 cmd.exe 104 PID 3424 wrote to memory of 2296 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 105 PID 3424 wrote to memory of 2296 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 105 PID 3424 wrote to memory of 2296 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 105 PID 3424 wrote to memory of 2160 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 106 PID 3424 wrote to memory of 2160 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 106 PID 3424 wrote to memory of 2160 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 106 PID 3424 wrote to memory of 1956 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 107 PID 3424 wrote to memory of 1956 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 107 PID 3424 wrote to memory of 1956 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 107 PID 3424 wrote to memory of 2932 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 108 PID 3424 wrote to memory of 2932 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 108 PID 3424 wrote to memory of 2932 3424 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 108 PID 2932 wrote to memory of 372 2932 cmd.exe 113 PID 2932 wrote to memory of 372 2932 cmd.exe 113 PID 2932 wrote to memory of 372 2932 cmd.exe 113 PID 2920 wrote to memory of 4436 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 114 PID 2920 wrote to memory of 4436 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 114 PID 2920 wrote to memory of 4436 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 114 PID 2920 wrote to memory of 4840 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 116 PID 2920 wrote to memory of 4840 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 116 PID 2920 wrote to memory of 4840 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 116 PID 2920 wrote to memory of 2292 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 117 PID 2920 wrote to memory of 2292 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 117 PID 2920 wrote to memory of 2292 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 117 PID 2920 wrote to memory of 4912 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 118 PID 2920 wrote to memory of 4912 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 118 PID 2920 wrote to memory of 4912 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 118 PID 2920 wrote to memory of 2688 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 119 PID 2920 wrote to memory of 2688 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 119 PID 2920 wrote to memory of 2688 2920 2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe 119 PID 4436 wrote to memory of 1624 4436 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\kIkQkMYQ\SeQIsQgk.exe"C:\Users\Admin\kIkQkMYQ\SeQIsQgk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2676
-
-
C:\ProgramData\IoQYoIQE\EugIUEIc.exe"C:\ProgramData\IoQYoIQE\EugIUEIc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"8⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"10⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"12⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"14⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"16⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"18⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"20⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"22⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"24⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"26⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"28⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"30⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"32⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock33⤵PID:3008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"34⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock35⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"36⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock37⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"38⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock39⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"40⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock41⤵PID:372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"42⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock43⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"44⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock45⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"46⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock47⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"48⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock49⤵PID:1456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"50⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock51⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"52⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock53⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"54⤵
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock55⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"56⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock57⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"58⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock59⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"60⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock61⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"62⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock63⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"64⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock65⤵PID:944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"66⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock67⤵PID:784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"68⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock69⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"70⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock71⤵PID:2068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"72⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock73⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"74⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock75⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"76⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock77⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"78⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock79⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"80⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock81⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"82⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock83⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"84⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock85⤵PID:2888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"86⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock87⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"88⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock89⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"90⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock91⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"92⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock93⤵PID:1928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"94⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock95⤵PID:1052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"96⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock97⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"98⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock99⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"100⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock101⤵
- System Location Discovery: System Language Discovery
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"102⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock103⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"104⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock105⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"106⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock107⤵PID:1760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"108⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock109⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"110⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock111⤵PID:824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"112⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock113⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"114⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock115⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"116⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock117⤵PID:668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"118⤵PID:4216
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock119⤵PID:1184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"120⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock121⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-05_270ed136d56c54fbfb1966632b078e73_virlock"122⤵
- System Location Discovery: System Language Discovery
PID:4764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-