Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe
-
Size
143KB
-
MD5
9b2c74478464af11cc7a8d075183837e
-
SHA1
32bee1800b816bf16ff597a725bce001baefea8f
-
SHA256
877c37e2b15ac450c67c4d88964ee53357e0722b03a046c603f626d3f39e80a4
-
SHA512
832ff64c2c69ac6bf94beee2b7695e8e1cf671815be47921d2cd2e48652f1d912665da6110ef0258f3e1dc01bdc04e204cf8f05052541fbad91aa25c783a8780
-
SSDEEP
3072:tfXPFEhlwj1pKzASHRPGq5yIq7Hxr+r6d+39fx:JXt6wj1pKzASx+YyIq7RS9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation zockIsws.exe -
Executes dropped EXE 3 IoCs
pid Process 2132 QkQkIMAM.exe 2828 zockIsws.exe 1460 QkQkIMAM.exe -
Loads dropped DLL 27 IoCs
pid Process 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 444 WerFault.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\QkQkIMAM.exe = "C:\\Users\\Admin\\ZoYIwkIY\\QkQkIMAM.exe" 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zockIsws.exe = "C:\\ProgramData\\yeIcgkEE\\zockIsws.exe" 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zockIsws.exe = "C:\\ProgramData\\yeIcgkEE\\zockIsws.exe" zockIsws.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\QkQkIMAM.exe = "C:\\Users\\Admin\\ZoYIwkIY\\QkQkIMAM.exe" QkQkIMAM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\QkQkIMAM.exe = "C:\\Users\\Admin\\ZoYIwkIY\\QkQkIMAM.exe" 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\QkQkIMAM.exe = "C:\\Users\\Admin\\ZoYIwkIY\\QkQkIMAM.exe" QkQkIMAM.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico zockIsws.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 444 1460 WerFault.exe 44 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2576 reg.exe 2176 reg.exe 1740 reg.exe 480 reg.exe 920 reg.exe 704 reg.exe 2136 reg.exe 2132 reg.exe 1052 reg.exe 2240 reg.exe 2528 reg.exe 1064 reg.exe 1684 reg.exe 556 reg.exe 2284 reg.exe 2832 reg.exe 3028 reg.exe 288 reg.exe 1752 reg.exe 2652 reg.exe 1560 reg.exe 2488 reg.exe 2204 reg.exe 2580 reg.exe 920 reg.exe 2036 reg.exe 2376 reg.exe 1492 reg.exe 1172 reg.exe 2960 reg.exe 2528 reg.exe 1652 reg.exe 1604 reg.exe 2252 reg.exe 2876 reg.exe 2220 reg.exe 2172 reg.exe 2380 reg.exe 2808 reg.exe 608 reg.exe 2116 reg.exe 2616 reg.exe 1952 reg.exe 1748 reg.exe 2400 reg.exe 1696 reg.exe 1388 reg.exe 2500 reg.exe 1492 reg.exe 2808 reg.exe 272 reg.exe 1752 reg.exe 328 reg.exe 1104 reg.exe 3012 reg.exe 2588 reg.exe 2760 reg.exe 3008 reg.exe 2768 reg.exe 2796 reg.exe 2808 reg.exe 2688 reg.exe 2592 reg.exe 2944 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2936 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2936 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2120 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2120 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2288 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2288 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2676 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2676 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2576 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2576 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2500 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2500 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2908 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2908 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1780 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1780 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1796 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1796 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2808 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2808 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2312 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2312 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1476 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1476 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2104 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2104 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2280 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2280 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1832 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1832 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2528 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2528 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2040 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2040 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 596 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 596 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2236 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2236 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 352 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 352 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 860 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2652 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2652 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2424 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2424 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1764 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 1764 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2120 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2120 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2388 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2388 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 876 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 876 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2776 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 2776 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2828 zockIsws.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe 2828 zockIsws.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2132 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 30 PID 1620 wrote to memory of 2132 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 30 PID 1620 wrote to memory of 2132 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 30 PID 1620 wrote to memory of 2132 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 30 PID 1620 wrote to memory of 2828 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 31 PID 1620 wrote to memory of 2828 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 31 PID 1620 wrote to memory of 2828 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 31 PID 1620 wrote to memory of 2828 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 31 PID 1620 wrote to memory of 2580 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 32 PID 1620 wrote to memory of 2580 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 32 PID 1620 wrote to memory of 2580 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 32 PID 1620 wrote to memory of 2580 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 32 PID 2580 wrote to memory of 2572 2580 cmd.exe 34 PID 2580 wrote to memory of 2572 2580 cmd.exe 34 PID 2580 wrote to memory of 2572 2580 cmd.exe 34 PID 2580 wrote to memory of 2572 2580 cmd.exe 34 PID 1620 wrote to memory of 1744 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 35 PID 1620 wrote to memory of 1744 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 35 PID 1620 wrote to memory of 1744 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 35 PID 1620 wrote to memory of 1744 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 35 PID 1620 wrote to memory of 2812 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 36 PID 1620 wrote to memory of 2812 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 36 PID 1620 wrote to memory of 2812 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 36 PID 1620 wrote to memory of 2812 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 36 PID 1620 wrote to memory of 2592 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 37 PID 1620 wrote to memory of 2592 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 37 PID 1620 wrote to memory of 2592 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 37 PID 1620 wrote to memory of 2592 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 37 PID 1620 wrote to memory of 2548 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 38 PID 1620 wrote to memory of 2548 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 38 PID 1620 wrote to memory of 2548 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 38 PID 1620 wrote to memory of 2548 1620 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 38 PID 2548 wrote to memory of 2160 2548 cmd.exe 43 PID 2548 wrote to memory of 2160 2548 cmd.exe 43 PID 2548 wrote to memory of 2160 2548 cmd.exe 43 PID 2548 wrote to memory of 2160 2548 cmd.exe 43 PID 2572 wrote to memory of 1460 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 44 PID 2572 wrote to memory of 1460 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 44 PID 2572 wrote to memory of 1460 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 44 PID 2572 wrote to memory of 1460 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 44 PID 2572 wrote to memory of 2192 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 45 PID 2572 wrote to memory of 2192 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 45 PID 2572 wrote to memory of 2192 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 45 PID 2572 wrote to memory of 2192 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 45 PID 2192 wrote to memory of 2936 2192 cmd.exe 47 PID 2192 wrote to memory of 2936 2192 cmd.exe 47 PID 2192 wrote to memory of 2936 2192 cmd.exe 47 PID 2192 wrote to memory of 2936 2192 cmd.exe 47 PID 2572 wrote to memory of 2096 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 48 PID 2572 wrote to memory of 2096 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 48 PID 2572 wrote to memory of 2096 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 48 PID 2572 wrote to memory of 2096 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 48 PID 2572 wrote to memory of 2944 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 49 PID 2572 wrote to memory of 2944 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 49 PID 2572 wrote to memory of 2944 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 49 PID 2572 wrote to memory of 2944 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 49 PID 2572 wrote to memory of 2616 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 51 PID 2572 wrote to memory of 2616 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 51 PID 2572 wrote to memory of 2616 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 51 PID 2572 wrote to memory of 2616 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 51 PID 2572 wrote to memory of 2908 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 54 PID 2572 wrote to memory of 2908 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 54 PID 2572 wrote to memory of 2908 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 54 PID 2572 wrote to memory of 2908 2572 2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\ZoYIwkIY\QkQkIMAM.exe"C:\Users\Admin\ZoYIwkIY\QkQkIMAM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2132
-
-
C:\ProgramData\yeIcgkEE\zockIsws.exe"C:\ProgramData\yeIcgkEE\zockIsws.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2828
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\ZoYIwkIY\QkQkIMAM.exe"C:\Users\Admin\ZoYIwkIY\QkQkIMAM.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 1925⤵
- Loads dropped DLL
- Program crash
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"6⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"8⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"10⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"12⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"14⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"16⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"18⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"20⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"22⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"24⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"26⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"28⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"30⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"32⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"36⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock37⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"38⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock39⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"40⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"42⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"44⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"46⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"48⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"50⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"52⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"54⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock55⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"56⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"58⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"60⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"62⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"64⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock65⤵PID:1296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"66⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock67⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"68⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock69⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"70⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock71⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"72⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock73⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"74⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock75⤵PID:876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"76⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock77⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"78⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock79⤵PID:2360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"80⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock81⤵PID:2348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"82⤵
- System Location Discovery: System Language Discovery
PID:392 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock83⤵PID:2080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"84⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock85⤵PID:1496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"86⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock87⤵PID:2076
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"88⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock89⤵PID:1772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"90⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock91⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"92⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock93⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"94⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock95⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"96⤵PID:352
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock97⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"98⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock99⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"100⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock101⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"102⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock103⤵PID:2136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"104⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock105⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"106⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock107⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"108⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock109⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"110⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock111⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"112⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock113⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"114⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock115⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"116⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock117⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"118⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock119⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"120⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock121⤵
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-07_9b2c74478464af11cc7a8d075183837e_virlock"122⤵PID:1008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-