Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe
-
Size
203KB
-
MD5
bb58b8f9026bd66985f7ea212561022a
-
SHA1
c15422826787e085d0d7b3fcfd1d7f0adb68143d
-
SHA256
29b205cd7255ed3a9a1078bd396dafe33966ebe5a289881a7f169eabd76ac5ed
-
SHA512
c4ce24fd55664934f09354e822b9051f90fa84079da30185142b5469d711d1af244b0cf4bc2689f801c9c38da2a88dcabc8d85044f5a1bc30df9044bebfe4d67
-
SSDEEP
6144:ccevyodMBtHBEPLW7VinSBth+3mJLi9FM9QU2hwnkptBhmiX:cLeBtHBEPLW7VinSBth+3cLi9XU2h2i7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation iYsEMcUM.exe -
Executes dropped EXE 2 IoCs
pid Process 3276 iYsEMcUM.exe 2384 cSkYcoAo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iYsEMcUM.exe = "C:\\Users\\Admin\\gWYwYEAU\\iYsEMcUM.exe" 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cSkYcoAo.exe = "C:\\ProgramData\\dCkwkUgY\\cSkYcoAo.exe" 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iYsEMcUM.exe = "C:\\Users\\Admin\\gWYwYEAU\\iYsEMcUM.exe" iYsEMcUM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cSkYcoAo.exe = "C:\\ProgramData\\dCkwkUgY\\cSkYcoAo.exe" cSkYcoAo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iYsEMcUM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3592 reg.exe 1408 reg.exe 3516 reg.exe 2152 reg.exe 2780 reg.exe 380 reg.exe 4820 reg.exe 5052 reg.exe 3936 reg.exe 2620 reg.exe 4332 reg.exe 552 Process not Found 2708 reg.exe 796 reg.exe 4452 reg.exe 1588 reg.exe 5084 reg.exe 4976 reg.exe 4348 reg.exe 4868 reg.exe 4184 reg.exe 5088 reg.exe 4972 reg.exe 2456 reg.exe 4692 reg.exe 4692 reg.exe 552 reg.exe 5088 Process not Found 748 reg.exe 4448 reg.exe 3588 reg.exe 3772 reg.exe 868 reg.exe 3756 reg.exe 4528 reg.exe 1080 reg.exe 4388 reg.exe 5012 Process not Found 4048 reg.exe 2240 reg.exe 4040 reg.exe 3792 Process not Found 3124 reg.exe 552 reg.exe 4692 reg.exe 220 reg.exe 64 reg.exe 4992 reg.exe 3704 reg.exe 3532 reg.exe 4520 reg.exe 4496 reg.exe 564 reg.exe 3464 reg.exe 4660 reg.exe 4336 reg.exe 4732 Process not Found 3924 reg.exe 1028 reg.exe 3420 reg.exe 1912 reg.exe 4556 reg.exe 4376 reg.exe 2324 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2152 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2152 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2152 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2152 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1684 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1684 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1684 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1684 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1408 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1408 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1408 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1408 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 808 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 808 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 808 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 808 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2240 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2240 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2240 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2240 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2052 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2052 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2052 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2052 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 3660 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 3660 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 3660 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 3660 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2544 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2544 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2544 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 2544 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4972 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4972 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4972 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4972 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4796 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4796 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4796 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 4796 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1348 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1348 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1348 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1348 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 860 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 860 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 860 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 860 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1484 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1484 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1484 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 1484 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3276 iYsEMcUM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe 3276 iYsEMcUM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3276 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 86 PID 4588 wrote to memory of 3276 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 86 PID 4588 wrote to memory of 3276 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 86 PID 4588 wrote to memory of 2384 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 87 PID 4588 wrote to memory of 2384 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 87 PID 4588 wrote to memory of 2384 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 87 PID 4588 wrote to memory of 2484 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 88 PID 4588 wrote to memory of 2484 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 88 PID 4588 wrote to memory of 2484 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 88 PID 4588 wrote to memory of 4388 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 90 PID 4588 wrote to memory of 4388 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 90 PID 4588 wrote to memory of 4388 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 90 PID 4588 wrote to memory of 1656 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 91 PID 4588 wrote to memory of 1656 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 91 PID 4588 wrote to memory of 1656 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 91 PID 4588 wrote to memory of 4332 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 92 PID 4588 wrote to memory of 4332 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 92 PID 4588 wrote to memory of 4332 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 92 PID 4588 wrote to memory of 4468 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 93 PID 4588 wrote to memory of 4468 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 93 PID 4588 wrote to memory of 4468 4588 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 93 PID 2484 wrote to memory of 5004 2484 cmd.exe 97 PID 2484 wrote to memory of 5004 2484 cmd.exe 97 PID 2484 wrote to memory of 5004 2484 cmd.exe 97 PID 4468 wrote to memory of 1460 4468 cmd.exe 99 PID 4468 wrote to memory of 1460 4468 cmd.exe 99 PID 4468 wrote to memory of 1460 4468 cmd.exe 99 PID 5004 wrote to memory of 3128 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 100 PID 5004 wrote to memory of 3128 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 100 PID 5004 wrote to memory of 3128 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 100 PID 3128 wrote to memory of 5024 3128 cmd.exe 102 PID 3128 wrote to memory of 5024 3128 cmd.exe 102 PID 3128 wrote to memory of 5024 3128 cmd.exe 102 PID 5004 wrote to memory of 4496 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 103 PID 5004 wrote to memory of 4496 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 103 PID 5004 wrote to memory of 4496 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 103 PID 5004 wrote to memory of 2556 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 104 PID 5004 wrote to memory of 2556 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 104 PID 5004 wrote to memory of 2556 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 104 PID 5004 wrote to memory of 4672 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 105 PID 5004 wrote to memory of 4672 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 105 PID 5004 wrote to memory of 4672 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 105 PID 5004 wrote to memory of 3932 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 106 PID 5004 wrote to memory of 3932 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 106 PID 5004 wrote to memory of 3932 5004 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 106 PID 3932 wrote to memory of 2524 3932 cmd.exe 111 PID 3932 wrote to memory of 2524 3932 cmd.exe 111 PID 3932 wrote to memory of 2524 3932 cmd.exe 111 PID 5024 wrote to memory of 4052 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 112 PID 5024 wrote to memory of 4052 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 112 PID 5024 wrote to memory of 4052 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 112 PID 4052 wrote to memory of 2152 4052 cmd.exe 114 PID 4052 wrote to memory of 2152 4052 cmd.exe 114 PID 4052 wrote to memory of 2152 4052 cmd.exe 114 PID 5024 wrote to memory of 5072 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 115 PID 5024 wrote to memory of 5072 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 115 PID 5024 wrote to memory of 5072 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 115 PID 5024 wrote to memory of 4020 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 116 PID 5024 wrote to memory of 4020 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 116 PID 5024 wrote to memory of 4020 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 116 PID 5024 wrote to memory of 4804 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 117 PID 5024 wrote to memory of 4804 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 117 PID 5024 wrote to memory of 4804 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 117 PID 5024 wrote to memory of 4376 5024 2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\gWYwYEAU\iYsEMcUM.exe"C:\Users\Admin\gWYwYEAU\iYsEMcUM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3276
-
-
C:\ProgramData\dCkwkUgY\cSkYcoAo.exe"C:\ProgramData\dCkwkUgY\cSkYcoAo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2384
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"8⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"10⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"12⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"14⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"16⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"18⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"20⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"22⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"24⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"26⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"28⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"30⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"32⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock33⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock35⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"36⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock37⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"38⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock39⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"40⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock41⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"42⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock43⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"44⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock45⤵PID:1448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"46⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock47⤵PID:1660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"48⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock49⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"50⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock51⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"52⤵PID:4344
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock53⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"54⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock55⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"56⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock57⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"58⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock59⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"60⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock61⤵PID:464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"62⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock63⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"64⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock65⤵PID:2660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"66⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock67⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"68⤵PID:456
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock69⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"70⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock71⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"72⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock73⤵PID:952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"74⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock75⤵PID:860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"76⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock77⤵PID:2724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"78⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock79⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"80⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock81⤵PID:3744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"82⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock83⤵PID:3128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"84⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock85⤵PID:800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"86⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock87⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"88⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock89⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"90⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock91⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"92⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock93⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"94⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock95⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"96⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock97⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"98⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock99⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"100⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock101⤵PID:428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"102⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock103⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"104⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock105⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"106⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock107⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"108⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock109⤵
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"110⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock111⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"112⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock113⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"114⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock115⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"116⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock117⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"118⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock119⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"120⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock121⤵PID:2916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-13_bb58b8f9026bd66985f7ea212561022a_virlock"122⤵PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-