Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 11:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe
-
Size
200KB
-
MD5
afaa6a14eb7b46dc2165b3654e238b1a
-
SHA1
de9344d62cbe3bb743605e5b08ef2f0f53105a24
-
SHA256
cb4bd47c9b59bf3955ea560705f748457e4656d8d07c68744e177a487f25a6b8
-
SHA512
8439927311549274249f631eea79f4daa7d4334d3f300cd6d0b4810c7528fa3adbab1d3f6bd6fdb0efba64321a43eedba1453d5ef9dab6fa83724a28675a695e
-
SSDEEP
3072:jR3295cHoQmi9B6m38FER2L0GC9gA5n3xGFVDGQ9U8XcURE5gwfxG9FDtN:dG5omVmM8cA5nBGF9U8XcUREHfxGH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Control Panel\International\Geo\Nation qSUckMMs.exe -
Executes dropped EXE 2 IoCs
pid Process 2200 qSUckMMs.exe 2180 cyQwUoUo.exe -
Loads dropped DLL 20 IoCs
pid Process 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cyQwUoUo.exe = "C:\\ProgramData\\oYAUEIMw\\cyQwUoUo.exe" 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\qSUckMMs.exe = "C:\\Users\\Admin\\gmoEkEkI\\qSUckMMs.exe" qSUckMMs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cyQwUoUo.exe = "C:\\ProgramData\\oYAUEIMw\\cyQwUoUo.exe" cyQwUoUo.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\qSUckMMs.exe = "C:\\Users\\Admin\\gmoEkEkI\\qSUckMMs.exe" 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico qSUckMMs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cyQwUoUo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2320 reg.exe 1300 reg.exe 2744 reg.exe 1044 reg.exe 1412 reg.exe 1116 reg.exe 2584 reg.exe 2924 reg.exe 2568 reg.exe 2164 reg.exe 300 reg.exe 2220 reg.exe 1500 reg.exe 2552 reg.exe 2928 reg.exe 2092 reg.exe 916 reg.exe 1160 reg.exe 2600 reg.exe 880 reg.exe 2580 reg.exe 1592 reg.exe 896 reg.exe 2184 reg.exe 904 reg.exe 2056 reg.exe 2068 reg.exe 2320 reg.exe 2108 reg.exe 1776 reg.exe 2800 reg.exe 956 reg.exe 1616 reg.exe 2172 reg.exe 2248 reg.exe 888 reg.exe 108 reg.exe 992 reg.exe 1972 reg.exe 932 reg.exe 1928 reg.exe 840 reg.exe 2572 reg.exe 2552 reg.exe 1944 reg.exe 2964 reg.exe 1560 reg.exe 2532 reg.exe 1864 reg.exe 2584 reg.exe 1980 reg.exe 2132 reg.exe 1032 reg.exe 2892 reg.exe 2492 reg.exe 1992 reg.exe 2136 reg.exe 2580 reg.exe 760 reg.exe 2656 reg.exe 2232 reg.exe 872 reg.exe 2264 reg.exe 2144 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2972 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2972 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2020 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2020 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2780 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2780 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1156 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1156 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2176 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2176 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1464 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1464 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2560 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2560 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1512 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1512 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1748 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1748 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 860 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 860 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2168 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2168 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2896 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2896 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2844 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2844 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2560 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2560 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1700 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1700 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1692 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1692 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1788 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1788 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2888 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2888 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2952 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2952 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2476 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2476 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 372 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 372 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 3036 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 3036 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2968 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2968 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2432 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2432 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1636 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1636 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 744 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 744 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 828 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 828 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1968 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 1968 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 772 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 772 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2176 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 2176 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2200 qSUckMMs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe 2200 qSUckMMs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1660 wrote to memory of 2200 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 28 PID 1660 wrote to memory of 2200 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 28 PID 1660 wrote to memory of 2200 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 28 PID 1660 wrote to memory of 2200 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 28 PID 1660 wrote to memory of 2180 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 29 PID 1660 wrote to memory of 2180 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 29 PID 1660 wrote to memory of 2180 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 29 PID 1660 wrote to memory of 2180 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 29 PID 1660 wrote to memory of 1572 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 30 PID 1660 wrote to memory of 1572 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 30 PID 1660 wrote to memory of 1572 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 30 PID 1660 wrote to memory of 1572 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 30 PID 1572 wrote to memory of 2420 1572 cmd.exe 32 PID 1572 wrote to memory of 2420 1572 cmd.exe 32 PID 1572 wrote to memory of 2420 1572 cmd.exe 32 PID 1572 wrote to memory of 2420 1572 cmd.exe 32 PID 1660 wrote to memory of 1608 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 33 PID 1660 wrote to memory of 1608 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 33 PID 1660 wrote to memory of 1608 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 33 PID 1660 wrote to memory of 1608 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 33 PID 1660 wrote to memory of 2900 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 34 PID 1660 wrote to memory of 2900 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 34 PID 1660 wrote to memory of 2900 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 34 PID 1660 wrote to memory of 2900 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 34 PID 1660 wrote to memory of 2956 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 36 PID 1660 wrote to memory of 2956 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 36 PID 1660 wrote to memory of 2956 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 36 PID 1660 wrote to memory of 2956 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 36 PID 1660 wrote to memory of 2964 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 39 PID 1660 wrote to memory of 2964 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 39 PID 1660 wrote to memory of 2964 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 39 PID 1660 wrote to memory of 2964 1660 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 39 PID 2964 wrote to memory of 2716 2964 cmd.exe 41 PID 2964 wrote to memory of 2716 2964 cmd.exe 41 PID 2964 wrote to memory of 2716 2964 cmd.exe 41 PID 2964 wrote to memory of 2716 2964 cmd.exe 41 PID 2420 wrote to memory of 760 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 42 PID 2420 wrote to memory of 760 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 42 PID 2420 wrote to memory of 760 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 42 PID 2420 wrote to memory of 760 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 42 PID 760 wrote to memory of 2972 760 cmd.exe 44 PID 760 wrote to memory of 2972 760 cmd.exe 44 PID 760 wrote to memory of 2972 760 cmd.exe 44 PID 760 wrote to memory of 2972 760 cmd.exe 44 PID 2420 wrote to memory of 2624 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 45 PID 2420 wrote to memory of 2624 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 45 PID 2420 wrote to memory of 2624 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 45 PID 2420 wrote to memory of 2624 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 45 PID 2420 wrote to memory of 2652 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 46 PID 2420 wrote to memory of 2652 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 46 PID 2420 wrote to memory of 2652 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 46 PID 2420 wrote to memory of 2652 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 46 PID 2420 wrote to memory of 1184 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 47 PID 2420 wrote to memory of 1184 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 47 PID 2420 wrote to memory of 1184 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 47 PID 2420 wrote to memory of 1184 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 47 PID 2420 wrote to memory of 2536 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 50 PID 2420 wrote to memory of 2536 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 50 PID 2420 wrote to memory of 2536 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 50 PID 2420 wrote to memory of 2536 2420 2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe 50 PID 2536 wrote to memory of 640 2536 cmd.exe 53 PID 2536 wrote to memory of 640 2536 cmd.exe 53 PID 2536 wrote to memory of 640 2536 cmd.exe 53 PID 2536 wrote to memory of 640 2536 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\gmoEkEkI\qSUckMMs.exe"C:\Users\Admin\gmoEkEkI\qSUckMMs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2200
-
-
C:\ProgramData\oYAUEIMw\cyQwUoUo.exe"C:\ProgramData\oYAUEIMw\cyQwUoUo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"6⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"8⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"10⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"12⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"14⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"16⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"18⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"20⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"22⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"24⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"26⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"28⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock29⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"30⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"32⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"34⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"36⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"38⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"40⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"42⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"44⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"46⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"48⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"50⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"52⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"54⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"56⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"58⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"60⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock61⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"62⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"64⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock65⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"66⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock67⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"68⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock69⤵PID:2008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"70⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock71⤵PID:1672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"72⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock73⤵PID:2128
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"74⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock75⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"76⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock77⤵PID:1508
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"78⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock79⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"80⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock81⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"82⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock83⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"84⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock85⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"86⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock87⤵PID:1788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"88⤵
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock89⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"90⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock91⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"92⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock93⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"94⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock95⤵PID:892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"96⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock97⤵PID:2264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"98⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock99⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"100⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock101⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"102⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock103⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"104⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock105⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"106⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock107⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"108⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock109⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"110⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock111⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"112⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock113⤵PID:1116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"114⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock115⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"116⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock117⤵PID:1992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"118⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock119⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"120⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock121⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_afaa6a14eb7b46dc2165b3654e238b1a_virlock"122⤵PID:828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-