Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-08-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe
-
Size
190KB
-
MD5
e9abc8025a9ead22032dd851ac7084b2
-
SHA1
f33271921b3645af0c584c3c71b82fc31f835754
-
SHA256
c02e1a73f36d717a7ad3aebdd64edb1b723d585138521c0a41ce019590bc3ce0
-
SHA512
a778a0bd89783b7c8bb273b800faa327e336b3ea95a0f7c52266ff2d056060d26999cb637d74ffadf596155455fed203dff6b926ade475ff5c296244bddba40b
-
SSDEEP
3072:qgWwh/4OjzH5yAdv2qTFVXF6xs8wy8NGrbw4mzOgcGtJG:X+8dbRzep3bwBOgcU
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (72) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation RSMUocUA.exe -
Executes dropped EXE 2 IoCs
pid Process 2748 RSMUocUA.exe 1520 QWAkUAYo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RSMUocUA.exe = "C:\\Users\\Admin\\ikYockAw\\RSMUocUA.exe" RSMUocUA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QWAkUAYo.exe = "C:\\ProgramData\\gsAUEgwc\\QWAkUAYo.exe" QWAkUAYo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RSMUocUA.exe = "C:\\Users\\Admin\\ikYockAw\\RSMUocUA.exe" 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\QWAkUAYo.exe = "C:\\ProgramData\\gsAUEgwc\\QWAkUAYo.exe" 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe RSMUocUA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QWAkUAYo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Modifies registry key 1 TTPs 64 IoCs
pid Process 444 reg.exe 1584 reg.exe 3884 Process not Found 2900 Process not Found 3352 reg.exe 1224 reg.exe 4960 reg.exe 1300 reg.exe 1340 reg.exe 3284 Process not Found 3040 Process not Found 4500 Process not Found 4952 reg.exe 4408 reg.exe 1860 reg.exe 2304 reg.exe 3644 reg.exe 2816 reg.exe 1016 reg.exe 2544 reg.exe 5032 reg.exe 828 reg.exe 3568 reg.exe 4328 reg.exe 3192 reg.exe 1044 reg.exe 4892 Process not Found 2292 reg.exe 2608 reg.exe 4812 reg.exe 4824 reg.exe 3476 reg.exe 2928 Process not Found 2008 Process not Found 712 reg.exe 1860 reg.exe 2156 reg.exe 1628 reg.exe 3064 reg.exe 3780 reg.exe 1900 reg.exe 860 Process not Found 3516 Process not Found 3364 reg.exe 2828 reg.exe 5052 reg.exe 4372 reg.exe 3648 reg.exe 4088 reg.exe 1848 Process not Found 3208 reg.exe 2444 reg.exe 4932 reg.exe 2240 reg.exe 1716 Process not Found 4292 reg.exe 4404 reg.exe 4608 reg.exe 3344 reg.exe 2484 reg.exe 1456 Process not Found 436 reg.exe 2004 reg.exe 4872 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3740 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3740 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3740 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3740 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4264 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4264 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4264 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4264 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2252 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2252 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2252 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2252 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3960 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3960 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3960 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3960 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4256 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4256 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4256 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4256 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4544 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4544 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4544 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4544 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 1876 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 1876 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 1876 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 1876 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 748 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 748 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 748 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 748 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2260 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2260 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2260 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2260 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3232 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3232 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3232 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 3232 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4032 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4032 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4032 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 4032 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2380 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2380 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2380 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 2380 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 832 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 832 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 832 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 832 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2748 RSMUocUA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe 2748 RSMUocUA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2748 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 86 PID 2804 wrote to memory of 2748 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 86 PID 2804 wrote to memory of 2748 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 86 PID 2804 wrote to memory of 1520 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 87 PID 2804 wrote to memory of 1520 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 87 PID 2804 wrote to memory of 1520 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 87 PID 2804 wrote to memory of 2156 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 88 PID 2804 wrote to memory of 2156 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 88 PID 2804 wrote to memory of 2156 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 88 PID 2804 wrote to memory of 1232 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 90 PID 2804 wrote to memory of 1232 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 90 PID 2804 wrote to memory of 1232 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 90 PID 2804 wrote to memory of 4492 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 91 PID 2804 wrote to memory of 4492 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 91 PID 2804 wrote to memory of 4492 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 91 PID 2804 wrote to memory of 4840 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 92 PID 2804 wrote to memory of 4840 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 92 PID 2804 wrote to memory of 4840 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 92 PID 2804 wrote to memory of 1488 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 93 PID 2804 wrote to memory of 1488 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 93 PID 2804 wrote to memory of 1488 2804 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 93 PID 2156 wrote to memory of 5016 2156 cmd.exe 98 PID 2156 wrote to memory of 5016 2156 cmd.exe 98 PID 2156 wrote to memory of 5016 2156 cmd.exe 98 PID 1488 wrote to memory of 1016 1488 cmd.exe 99 PID 1488 wrote to memory of 1016 1488 cmd.exe 99 PID 1488 wrote to memory of 1016 1488 cmd.exe 99 PID 5016 wrote to memory of 4296 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 100 PID 5016 wrote to memory of 4296 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 100 PID 5016 wrote to memory of 4296 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 100 PID 4296 wrote to memory of 3692 4296 cmd.exe 102 PID 4296 wrote to memory of 3692 4296 cmd.exe 102 PID 4296 wrote to memory of 3692 4296 cmd.exe 102 PID 5016 wrote to memory of 2184 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 103 PID 5016 wrote to memory of 2184 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 103 PID 5016 wrote to memory of 2184 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 103 PID 5016 wrote to memory of 4044 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 104 PID 5016 wrote to memory of 4044 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 104 PID 5016 wrote to memory of 4044 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 104 PID 5016 wrote to memory of 2292 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 105 PID 5016 wrote to memory of 2292 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 105 PID 5016 wrote to memory of 2292 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 105 PID 5016 wrote to memory of 4080 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 106 PID 5016 wrote to memory of 4080 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 106 PID 5016 wrote to memory of 4080 5016 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 106 PID 4080 wrote to memory of 852 4080 cmd.exe 111 PID 4080 wrote to memory of 852 4080 cmd.exe 111 PID 4080 wrote to memory of 852 4080 cmd.exe 111 PID 3692 wrote to memory of 1800 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 112 PID 3692 wrote to memory of 1800 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 112 PID 3692 wrote to memory of 1800 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 112 PID 1800 wrote to memory of 3740 1800 cmd.exe 114 PID 1800 wrote to memory of 3740 1800 cmd.exe 114 PID 1800 wrote to memory of 3740 1800 cmd.exe 114 PID 3692 wrote to memory of 2444 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 115 PID 3692 wrote to memory of 2444 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 115 PID 3692 wrote to memory of 2444 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 115 PID 3692 wrote to memory of 2300 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 116 PID 3692 wrote to memory of 2300 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 116 PID 3692 wrote to memory of 2300 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 116 PID 3692 wrote to memory of 912 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 117 PID 3692 wrote to memory of 912 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 117 PID 3692 wrote to memory of 912 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 117 PID 3692 wrote to memory of 3708 3692 2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\ikYockAw\RSMUocUA.exe"C:\Users\Admin\ikYockAw\RSMUocUA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2748
-
-
C:\ProgramData\gsAUEgwc\QWAkUAYo.exe"C:\ProgramData\gsAUEgwc\QWAkUAYo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"8⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"10⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"12⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"14⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"16⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"18⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"20⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"22⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"24⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"26⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"28⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"30⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"32⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock33⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock35⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"36⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock37⤵PID:3064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"38⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock39⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"40⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock41⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"42⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock43⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"44⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock45⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"46⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock47⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"48⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock49⤵PID:3620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"50⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock51⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"52⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock53⤵PID:1012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"54⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock55⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"56⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock57⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"58⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock59⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"60⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock61⤵PID:1368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"62⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock63⤵PID:2488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"64⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock65⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"66⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock67⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"68⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock69⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"70⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock71⤵PID:3968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"72⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock73⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"74⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock75⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"76⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock77⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"78⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock79⤵PID:2280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"80⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock81⤵PID:1464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"82⤵PID:3884
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock83⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"84⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock85⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"86⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock87⤵PID:5032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"88⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock89⤵PID:5108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"90⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock91⤵PID:2152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"92⤵
- System Location Discovery: System Language Discovery
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock93⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"94⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock95⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"96⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock97⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"98⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock99⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"100⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock101⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"102⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock103⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"104⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock105⤵PID:828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"106⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock107⤵PID:3336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"108⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock109⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"110⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock111⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"112⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock113⤵PID:892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"114⤵PID:4152
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock115⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"116⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock117⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"118⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock119⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"120⤵
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock121⤵
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-08-08_e9abc8025a9ead22032dd851ac7084b2_virlock"122⤵PID:3588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-