Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 11:10
Static task
static1
Behavioral task
behavioral1
Sample
20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe
-
Size
195KB
-
MD5
a12fdb18d3868a6b3c58d2fdd11bc5ce
-
SHA1
f3d90972b72c95b438a9ceb08717e63ffb4617d1
-
SHA256
de0e001e8d17580cf7cc10b8b46abb574623077871384cbc3744bf02bfeb4bcc
-
SHA512
eea56efcde21887c39fcf7efeb6146bbb8a65e190682eec3eb9098896780a85260ca0f9fd9bc220eccd2534838238dce8003acf95d3121ac2af8f44445facd37
-
SSDEEP
3072:/y3uVDAnoRMxAxDR896OEUD/gqyfwkS2flMVlbBgyWvq7l2aDvu2TlQC81yXX8:/e3wK/T4bnflCgyeAl2aKK81cM
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Control Panel\International\Geo\Nation deowEogY.exe -
Deletes itself 1 IoCs
pid Process 2760 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3032 wokYgwEw.exe 2800 deowEogY.exe -
Loads dropped DLL 20 IoCs
pid Process 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\deowEogY.exe = "C:\\ProgramData\\zcUooogs\\deowEogY.exe" 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\deowEogY.exe = "C:\\ProgramData\\zcUooogs\\deowEogY.exe" deowEogY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\wokYgwEw.exe = "C:\\Users\\Admin\\cGoYMYgo\\wokYgwEw.exe" wokYgwEw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\wokYgwEw.exe = "C:\\Users\\Admin\\cGoYMYgo\\wokYgwEw.exe" 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico deowEogY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2812 reg.exe 2568 reg.exe 332 reg.exe 956 reg.exe 2172 reg.exe 2052 reg.exe 2276 reg.exe 3020 reg.exe 2680 reg.exe 1672 reg.exe 2124 reg.exe 2072 reg.exe 1900 reg.exe 2932 reg.exe 1344 reg.exe 2692 reg.exe 3012 reg.exe 1564 reg.exe 2824 reg.exe 2308 reg.exe 1616 reg.exe 2544 reg.exe 864 reg.exe 2812 reg.exe 2348 reg.exe 2644 reg.exe 2916 reg.exe 2216 reg.exe 2864 reg.exe 1324 reg.exe 1660 reg.exe 2672 reg.exe 1344 reg.exe 988 reg.exe 988 reg.exe 1380 reg.exe 2812 reg.exe 2440 reg.exe 2056 reg.exe 2448 reg.exe 2824 reg.exe 332 reg.exe 1644 reg.exe 1964 reg.exe 2784 reg.exe 1832 reg.exe 2752 reg.exe 2324 reg.exe 2220 reg.exe 1872 reg.exe 792 reg.exe 1748 reg.exe 1580 reg.exe 2204 reg.exe 1368 reg.exe 1520 reg.exe 2536 reg.exe 2220 reg.exe 1020 reg.exe 1344 reg.exe 2816 reg.exe 2556 reg.exe 2168 reg.exe 2104 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2864 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2864 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1088 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1088 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1880 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1880 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1860 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1860 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2308 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2308 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2712 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2712 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2332 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2332 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 692 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 692 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1620 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1620 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2656 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2656 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2496 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2496 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1348 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1348 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2340 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2340 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1436 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1436 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1984 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1984 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2660 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2660 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2308 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2308 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2816 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2816 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2712 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2712 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1544 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1544 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1900 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1900 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2280 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2280 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2656 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2656 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3008 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 3008 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2560 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2560 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1220 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 1220 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2460 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2460 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2836 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2836 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2688 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 2688 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 deowEogY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe 2800 deowEogY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3036 wrote to memory of 3032 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 30 PID 3036 wrote to memory of 3032 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 30 PID 3036 wrote to memory of 3032 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 30 PID 3036 wrote to memory of 3032 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 30 PID 3036 wrote to memory of 2800 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 31 PID 3036 wrote to memory of 2800 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 31 PID 3036 wrote to memory of 2800 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 31 PID 3036 wrote to memory of 2800 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 31 PID 3036 wrote to memory of 2892 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 32 PID 3036 wrote to memory of 2892 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 32 PID 3036 wrote to memory of 2892 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 32 PID 3036 wrote to memory of 2892 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 32 PID 3036 wrote to memory of 2568 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 34 PID 3036 wrote to memory of 2568 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 34 PID 3036 wrote to memory of 2568 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 34 PID 3036 wrote to memory of 2568 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 34 PID 2892 wrote to memory of 2732 2892 cmd.exe 35 PID 2892 wrote to memory of 2732 2892 cmd.exe 35 PID 2892 wrote to memory of 2732 2892 cmd.exe 35 PID 2892 wrote to memory of 2732 2892 cmd.exe 35 PID 3036 wrote to memory of 2632 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 36 PID 3036 wrote to memory of 2632 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 36 PID 3036 wrote to memory of 2632 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 36 PID 3036 wrote to memory of 2632 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 36 PID 3036 wrote to memory of 2556 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 37 PID 3036 wrote to memory of 2556 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 37 PID 3036 wrote to memory of 2556 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 37 PID 3036 wrote to memory of 2556 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 37 PID 3036 wrote to memory of 2536 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 40 PID 3036 wrote to memory of 2536 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 40 PID 3036 wrote to memory of 2536 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 40 PID 3036 wrote to memory of 2536 3036 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 40 PID 2536 wrote to memory of 2804 2536 cmd.exe 43 PID 2536 wrote to memory of 2804 2536 cmd.exe 43 PID 2536 wrote to memory of 2804 2536 cmd.exe 43 PID 2536 wrote to memory of 2804 2536 cmd.exe 43 PID 2732 wrote to memory of 2208 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 44 PID 2732 wrote to memory of 2208 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 44 PID 2732 wrote to memory of 2208 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 44 PID 2732 wrote to memory of 2208 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 44 PID 2208 wrote to memory of 2864 2208 cmd.exe 46 PID 2208 wrote to memory of 2864 2208 cmd.exe 46 PID 2208 wrote to memory of 2864 2208 cmd.exe 46 PID 2208 wrote to memory of 2864 2208 cmd.exe 46 PID 2732 wrote to memory of 1808 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 47 PID 2732 wrote to memory of 1808 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 47 PID 2732 wrote to memory of 1808 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 47 PID 2732 wrote to memory of 1808 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 47 PID 2732 wrote to memory of 1500 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 48 PID 2732 wrote to memory of 1500 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 48 PID 2732 wrote to memory of 1500 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 48 PID 2732 wrote to memory of 1500 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 48 PID 2732 wrote to memory of 1092 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 50 PID 2732 wrote to memory of 1092 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 50 PID 2732 wrote to memory of 1092 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 50 PID 2732 wrote to memory of 1092 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 50 PID 2732 wrote to memory of 2600 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 52 PID 2732 wrote to memory of 2600 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 52 PID 2732 wrote to memory of 2600 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 52 PID 2732 wrote to memory of 2600 2732 20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe 52 PID 2600 wrote to memory of 2572 2600 cmd.exe 55 PID 2600 wrote to memory of 2572 2600 cmd.exe 55 PID 2600 wrote to memory of 2572 2600 cmd.exe 55 PID 2600 wrote to memory of 2572 2600 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe"C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\cGoYMYgo\wokYgwEw.exe"C:\Users\Admin\cGoYMYgo\wokYgwEw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3032
-
-
C:\ProgramData\zcUooogs\deowEogY.exe"C:\ProgramData\zcUooogs\deowEogY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"6⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"8⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"10⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"12⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"14⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"16⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"18⤵
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"20⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"22⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"24⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"26⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"28⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock29⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"30⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"32⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock33⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"34⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"36⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"38⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"40⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"42⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"44⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"46⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"48⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"50⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock51⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"52⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"54⤵
- System Location Discovery: System Language Discovery
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"56⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"58⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"60⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"62⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"64⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock65⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"66⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock67⤵PID:1020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"68⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock69⤵PID:1824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"70⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock71⤵PID:1536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"72⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock73⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"74⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock75⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"76⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock77⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"78⤵
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock79⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"80⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock81⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"82⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock83⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"84⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock85⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"86⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock87⤵PID:2232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"88⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock89⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"90⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock91⤵PID:672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"92⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock93⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"94⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock95⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"96⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock97⤵PID:1148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"98⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock99⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"100⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock101⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"102⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock103⤵PID:624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"104⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock105⤵PID:2216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"106⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock107⤵PID:888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"108⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock109⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"110⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock111⤵PID:560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"112⤵
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock113⤵PID:1176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"114⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock115⤵PID:316
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"116⤵
- System Location Discovery: System Language Discovery
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock117⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"118⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock119⤵PID:692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"120⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock.exeC:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock121⤵PID:1200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240824a12fdb18d3868a6b3c58d2fdd11bc5cevirlock"122⤵PID:2756
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-