Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe
Resource
win10v2004-20240802-en
General
-
Target
202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe
-
Size
206KB
-
MD5
6987d2f5262ac57d7c87b0eda881bdbd
-
SHA1
ee90f31a1c4c2a0e57dc768e80459affa1911cc6
-
SHA256
7ec93c685703a178128b2e71e303b5de2a895e37736284510667146fa7ceb3d0
-
SHA512
5f69baa07e7b4166bff3228c6325fd7c58c75df3dc7797bf5e2531f927a079089ae5f86920c2750c694aefb3ddffcd16d46fd8d360ea32c090c4d8de1333f61a
-
SSDEEP
3072:OCKmfuor9dLB7WcAk6XHqPnAUGpjG+cyDFWmx9WjRDKLsJYuuuuuuuuuuuuuuuup:8K9dLfNSHq/7GhBfUGEun9D
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ZkYQcwwM.exe -
Executes dropped EXE 2 IoCs
pid Process 4156 GgkIMoog.exe 3148 ZkYQcwwM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ZkYQcwwM.exe = "C:\\ProgramData\\OukMUYQQ\\ZkYQcwwM.exe" ZkYQcwwM.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GgkIMoog.exe = "C:\\Users\\Admin\\MMYYYcoI\\GgkIMoog.exe" GgkIMoog.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GgkIMoog.exe = "C:\\Users\\Admin\\MMYYYcoI\\GgkIMoog.exe" 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ZkYQcwwM.exe = "C:\\ProgramData\\OukMUYQQ\\ZkYQcwwM.exe" 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe ZkYQcwwM.exe File created C:\Windows\SysWOW64\shell32.dll.exe ZkYQcwwM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1632 reg.exe 3872 Process not Found 1384 Process not Found 1952 reg.exe 4836 reg.exe 4252 reg.exe 3804 reg.exe 1996 reg.exe 5084 reg.exe 608 reg.exe 2604 Process not Found 4424 reg.exe 1036 reg.exe 1684 Process not Found 2020 Process not Found 1880 Process not Found 4072 reg.exe 5068 reg.exe 1144 reg.exe 1572 reg.exe 4576 reg.exe 1760 reg.exe 3888 reg.exe 1360 reg.exe 2180 reg.exe 3132 reg.exe 4024 reg.exe 2472 reg.exe 2092 reg.exe 4704 reg.exe 5072 reg.exe 1632 reg.exe 2128 reg.exe 112 reg.exe 2312 reg.exe 1388 reg.exe 2540 reg.exe 4520 reg.exe 996 Process not Found 1136 reg.exe 2560 Process not Found 3704 Process not Found 5020 reg.exe 4464 reg.exe 2260 reg.exe 2232 reg.exe 1732 reg.exe 4132 reg.exe 4916 Process not Found 2864 reg.exe 3144 reg.exe 4136 reg.exe 3652 reg.exe 3444 reg.exe 868 reg.exe 2472 reg.exe 3820 reg.exe 1916 reg.exe 3004 reg.exe 4516 reg.exe 2352 reg.exe 4628 reg.exe 2664 Process not Found 5012 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4204 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4204 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4204 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4204 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4396 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4396 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4396 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4396 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 412 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 412 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 412 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 412 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 5068 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 5068 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 5068 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 5068 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4000 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4000 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4000 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4000 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3912 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3912 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3912 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3912 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4116 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4116 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4116 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4116 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2380 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2380 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2380 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 2380 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3512 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3512 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3512 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 3512 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1796 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1796 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1796 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1796 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1224 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1224 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1224 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 1224 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4588 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4588 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4588 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4588 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4516 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4516 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4516 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 4516 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 ZkYQcwwM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe 3148 ZkYQcwwM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4156 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 85 PID 1676 wrote to memory of 4156 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 85 PID 1676 wrote to memory of 4156 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 85 PID 1676 wrote to memory of 3148 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 86 PID 1676 wrote to memory of 3148 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 86 PID 1676 wrote to memory of 3148 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 86 PID 1676 wrote to memory of 4920 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 87 PID 1676 wrote to memory of 4920 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 87 PID 1676 wrote to memory of 4920 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 87 PID 1676 wrote to memory of 1172 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 89 PID 1676 wrote to memory of 1172 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 89 PID 1676 wrote to memory of 1172 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 89 PID 1676 wrote to memory of 628 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 90 PID 1676 wrote to memory of 628 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 90 PID 1676 wrote to memory of 628 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 90 PID 1676 wrote to memory of 3440 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 91 PID 1676 wrote to memory of 3440 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 91 PID 1676 wrote to memory of 3440 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 91 PID 1676 wrote to memory of 4140 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 92 PID 1676 wrote to memory of 4140 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 92 PID 1676 wrote to memory of 4140 1676 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 92 PID 4920 wrote to memory of 2056 4920 cmd.exe 93 PID 4920 wrote to memory of 2056 4920 cmd.exe 93 PID 4920 wrote to memory of 2056 4920 cmd.exe 93 PID 4140 wrote to memory of 1964 4140 cmd.exe 98 PID 4140 wrote to memory of 1964 4140 cmd.exe 98 PID 4140 wrote to memory of 1964 4140 cmd.exe 98 PID 2056 wrote to memory of 4640 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 101 PID 2056 wrote to memory of 4640 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 101 PID 2056 wrote to memory of 4640 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 101 PID 4640 wrote to memory of 2212 4640 cmd.exe 103 PID 4640 wrote to memory of 2212 4640 cmd.exe 103 PID 4640 wrote to memory of 2212 4640 cmd.exe 103 PID 2056 wrote to memory of 3060 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 104 PID 2056 wrote to memory of 3060 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 104 PID 2056 wrote to memory of 3060 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 104 PID 2056 wrote to memory of 3704 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 105 PID 2056 wrote to memory of 3704 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 105 PID 2056 wrote to memory of 3704 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 105 PID 2056 wrote to memory of 544 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 106 PID 2056 wrote to memory of 544 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 106 PID 2056 wrote to memory of 544 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 106 PID 2056 wrote to memory of 4028 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 107 PID 2056 wrote to memory of 4028 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 107 PID 2056 wrote to memory of 4028 2056 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 107 PID 4028 wrote to memory of 3908 4028 cmd.exe 112 PID 4028 wrote to memory of 3908 4028 cmd.exe 112 PID 4028 wrote to memory of 3908 4028 cmd.exe 112 PID 2212 wrote to memory of 2472 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 113 PID 2212 wrote to memory of 2472 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 113 PID 2212 wrote to memory of 2472 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 113 PID 2472 wrote to memory of 4204 2472 cmd.exe 115 PID 2472 wrote to memory of 4204 2472 cmd.exe 115 PID 2472 wrote to memory of 4204 2472 cmd.exe 115 PID 2212 wrote to memory of 5104 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 116 PID 2212 wrote to memory of 5104 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 116 PID 2212 wrote to memory of 5104 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 116 PID 2212 wrote to memory of 5012 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 117 PID 2212 wrote to memory of 5012 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 117 PID 2212 wrote to memory of 5012 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 117 PID 2212 wrote to memory of 4836 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 118 PID 2212 wrote to memory of 4836 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 118 PID 2212 wrote to memory of 4836 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 118 PID 2212 wrote to memory of 2332 2212 202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe"C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\MMYYYcoI\GgkIMoog.exe"C:\Users\Admin\MMYYYcoI\GgkIMoog.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4156
-
-
C:\ProgramData\OukMUYQQ\ZkYQcwwM.exe"C:\ProgramData\OukMUYQQ\ZkYQcwwM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3148
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"6⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"8⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"10⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"12⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"14⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"16⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"18⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"20⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"22⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"24⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock25⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"26⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"28⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"30⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"32⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock33⤵PID:3696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"34⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock35⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"36⤵PID:3164
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock37⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"38⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock39⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"40⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock41⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"42⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock43⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"44⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock45⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"46⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock47⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"48⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock49⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"50⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock51⤵PID:3704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"52⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock53⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"54⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock55⤵PID:1000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"56⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock57⤵PID:3368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"58⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock59⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"60⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock61⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"62⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock63⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"64⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock65⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"66⤵PID:4456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock67⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"68⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock69⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"70⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock71⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"72⤵
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock73⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"74⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock75⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"76⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock77⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"78⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock79⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"80⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock81⤵PID:4696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"82⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock83⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"84⤵PID:3652
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock85⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"86⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock87⤵PID:4324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"88⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock89⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"90⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock91⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"92⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock93⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"94⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock95⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"96⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock97⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"98⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock99⤵PID:4788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"100⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock101⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"102⤵
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock103⤵PID:2720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"104⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock105⤵PID:4256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"106⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock107⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"108⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock109⤵PID:3836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"110⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock111⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"112⤵PID:432
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2472
-
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock113⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"114⤵PID:2936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock115⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"116⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock117⤵PID:2604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"118⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock119⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"120⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock.exeC:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock121⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202408246987d2f5262ac57d7c87b0eda881bdbdvirlock"122⤵PID:4556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-