Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 17:37
Static task
static1
Behavioral task
behavioral1
Sample
2024091396152c464108ec733320913981e12c2cvirlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024091396152c464108ec733320913981e12c2cvirlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024091396152c464108ec733320913981e12c2cvirlock.exe
-
Size
868KB
-
MD5
96152c464108ec733320913981e12c2c
-
SHA1
351c7fb27d47c2970540c22c28447db8194c706c
-
SHA256
0bf443c9da3577fc66ec7783f345c2f20821f20290f113cbd28926512272ba41
-
SHA512
893a733fa7a38013651da7271afaeabdd98f9e94bf24ca7caae52f073c581e3b2e3ee00e39ada9fd043e6ad6131776431341ec8900150fad9d77f7f39f300a44
-
SSDEEP
24576:Lw853ghghXWAYYJd6ftMofj/d1chLyiNYJ5cLmwcygVm7:Mrhghxd6ftMw7dcLyOy5mmOgVm7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation DWMgscMs.exe -
Executes dropped EXE 2 IoCs
pid Process 4928 DWMgscMs.exe 1408 egskwEUg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DWMgscMs.exe = "C:\\Users\\Admin\\HEEgQcEE\\DWMgscMs.exe" 2024091396152c464108ec733320913981e12c2cvirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\egskwEUg.exe = "C:\\ProgramData\\JaQwYgII\\egskwEUg.exe" 2024091396152c464108ec733320913981e12c2cvirlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DWMgscMs.exe = "C:\\Users\\Admin\\HEEgQcEE\\DWMgscMs.exe" DWMgscMs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\egskwEUg.exe = "C:\\ProgramData\\JaQwYgII\\egskwEUg.exe" egskwEUg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe DWMgscMs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024091396152c464108ec733320913981e12c2cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2692 reg.exe 3472 reg.exe 1084 reg.exe 4200 reg.exe 4732 reg.exe 2264 reg.exe 1412 reg.exe 2944 reg.exe 2076 reg.exe 3972 reg.exe 3600 reg.exe 3888 reg.exe 4552 reg.exe 4504 reg.exe 3848 reg.exe 4912 reg.exe 1236 reg.exe 2880 reg.exe 896 reg.exe 4300 reg.exe 5004 reg.exe 4956 reg.exe 4960 reg.exe 1636 reg.exe 1052 reg.exe 680 reg.exe 1724 reg.exe 3472 reg.exe 1560 reg.exe 1968 reg.exe 4276 reg.exe 2148 reg.exe 3600 reg.exe 3148 reg.exe 3840 reg.exe 4428 reg.exe 1824 reg.exe 336 reg.exe 1672 reg.exe 3524 reg.exe 2464 reg.exe 64 reg.exe 4588 reg.exe 3444 reg.exe 5004 reg.exe 2624 reg.exe 3964 reg.exe 2596 reg.exe 2728 reg.exe 1532 reg.exe 4540 reg.exe 2664 reg.exe 3888 reg.exe 2936 reg.exe 2748 reg.exe 4588 reg.exe 4412 reg.exe 4812 reg.exe 1448 reg.exe 4156 reg.exe 4708 reg.exe 4780 reg.exe 1192 reg.exe 3964 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 2480 2024091396152c464108ec733320913981e12c2cvirlock.exe 2480 2024091396152c464108ec733320913981e12c2cvirlock.exe 2480 2024091396152c464108ec733320913981e12c2cvirlock.exe 2480 2024091396152c464108ec733320913981e12c2cvirlock.exe 2832 2024091396152c464108ec733320913981e12c2cvirlock.exe 2832 2024091396152c464108ec733320913981e12c2cvirlock.exe 2832 2024091396152c464108ec733320913981e12c2cvirlock.exe 2832 2024091396152c464108ec733320913981e12c2cvirlock.exe 5096 2024091396152c464108ec733320913981e12c2cvirlock.exe 5096 2024091396152c464108ec733320913981e12c2cvirlock.exe 5096 2024091396152c464108ec733320913981e12c2cvirlock.exe 5096 2024091396152c464108ec733320913981e12c2cvirlock.exe 3032 2024091396152c464108ec733320913981e12c2cvirlock.exe 3032 2024091396152c464108ec733320913981e12c2cvirlock.exe 3032 2024091396152c464108ec733320913981e12c2cvirlock.exe 3032 2024091396152c464108ec733320913981e12c2cvirlock.exe 800 2024091396152c464108ec733320913981e12c2cvirlock.exe 800 2024091396152c464108ec733320913981e12c2cvirlock.exe 800 2024091396152c464108ec733320913981e12c2cvirlock.exe 800 2024091396152c464108ec733320913981e12c2cvirlock.exe 3936 2024091396152c464108ec733320913981e12c2cvirlock.exe 3936 2024091396152c464108ec733320913981e12c2cvirlock.exe 3936 2024091396152c464108ec733320913981e12c2cvirlock.exe 3936 2024091396152c464108ec733320913981e12c2cvirlock.exe 4936 2024091396152c464108ec733320913981e12c2cvirlock.exe 4936 2024091396152c464108ec733320913981e12c2cvirlock.exe 4936 2024091396152c464108ec733320913981e12c2cvirlock.exe 4936 2024091396152c464108ec733320913981e12c2cvirlock.exe 2936 2024091396152c464108ec733320913981e12c2cvirlock.exe 2936 2024091396152c464108ec733320913981e12c2cvirlock.exe 2936 2024091396152c464108ec733320913981e12c2cvirlock.exe 2936 2024091396152c464108ec733320913981e12c2cvirlock.exe 2968 2024091396152c464108ec733320913981e12c2cvirlock.exe 2968 2024091396152c464108ec733320913981e12c2cvirlock.exe 2968 2024091396152c464108ec733320913981e12c2cvirlock.exe 2968 2024091396152c464108ec733320913981e12c2cvirlock.exe 4276 2024091396152c464108ec733320913981e12c2cvirlock.exe 4276 2024091396152c464108ec733320913981e12c2cvirlock.exe 4276 2024091396152c464108ec733320913981e12c2cvirlock.exe 4276 2024091396152c464108ec733320913981e12c2cvirlock.exe 4904 2024091396152c464108ec733320913981e12c2cvirlock.exe 4904 2024091396152c464108ec733320913981e12c2cvirlock.exe 4904 2024091396152c464108ec733320913981e12c2cvirlock.exe 4904 2024091396152c464108ec733320913981e12c2cvirlock.exe 544 2024091396152c464108ec733320913981e12c2cvirlock.exe 544 2024091396152c464108ec733320913981e12c2cvirlock.exe 544 2024091396152c464108ec733320913981e12c2cvirlock.exe 544 2024091396152c464108ec733320913981e12c2cvirlock.exe 64 2024091396152c464108ec733320913981e12c2cvirlock.exe 64 2024091396152c464108ec733320913981e12c2cvirlock.exe 64 2024091396152c464108ec733320913981e12c2cvirlock.exe 64 2024091396152c464108ec733320913981e12c2cvirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4928 DWMgscMs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe 4928 DWMgscMs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 4928 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 85 PID 2392 wrote to memory of 4928 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 85 PID 2392 wrote to memory of 4928 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 85 PID 2392 wrote to memory of 1408 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 86 PID 2392 wrote to memory of 1408 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 86 PID 2392 wrote to memory of 1408 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 86 PID 2392 wrote to memory of 1412 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 87 PID 2392 wrote to memory of 1412 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 87 PID 2392 wrote to memory of 1412 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 87 PID 1412 wrote to memory of 2624 1412 cmd.exe 89 PID 1412 wrote to memory of 2624 1412 cmd.exe 89 PID 1412 wrote to memory of 2624 1412 cmd.exe 89 PID 2392 wrote to memory of 3888 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 90 PID 2392 wrote to memory of 3888 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 90 PID 2392 wrote to memory of 3888 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 90 PID 2392 wrote to memory of 4552 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 91 PID 2392 wrote to memory of 4552 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 91 PID 2392 wrote to memory of 4552 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 91 PID 2392 wrote to memory of 2276 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 92 PID 2392 wrote to memory of 2276 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 92 PID 2392 wrote to memory of 2276 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 92 PID 2392 wrote to memory of 5060 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 93 PID 2392 wrote to memory of 5060 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 93 PID 2392 wrote to memory of 5060 2392 2024091396152c464108ec733320913981e12c2cvirlock.exe 93 PID 5060 wrote to memory of 1652 5060 cmd.exe 98 PID 5060 wrote to memory of 1652 5060 cmd.exe 98 PID 5060 wrote to memory of 1652 5060 cmd.exe 98 PID 2624 wrote to memory of 700 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 99 PID 2624 wrote to memory of 700 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 99 PID 2624 wrote to memory of 700 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 99 PID 700 wrote to memory of 4508 700 cmd.exe 101 PID 700 wrote to memory of 4508 700 cmd.exe 101 PID 700 wrote to memory of 4508 700 cmd.exe 101 PID 2624 wrote to memory of 4732 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 102 PID 2624 wrote to memory of 4732 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 102 PID 2624 wrote to memory of 4732 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 102 PID 2624 wrote to memory of 2944 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 103 PID 2624 wrote to memory of 2944 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 103 PID 2624 wrote to memory of 2944 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 103 PID 2624 wrote to memory of 1464 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 104 PID 2624 wrote to memory of 1464 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 104 PID 2624 wrote to memory of 1464 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 104 PID 2624 wrote to memory of 4960 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 105 PID 2624 wrote to memory of 4960 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 105 PID 2624 wrote to memory of 4960 2624 2024091396152c464108ec733320913981e12c2cvirlock.exe 105 PID 4960 wrote to memory of 1052 4960 cmd.exe 110 PID 4960 wrote to memory of 1052 4960 cmd.exe 110 PID 4960 wrote to memory of 1052 4960 cmd.exe 110 PID 4508 wrote to memory of 4164 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 111 PID 4508 wrote to memory of 4164 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 111 PID 4508 wrote to memory of 4164 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 111 PID 4164 wrote to memory of 2480 4164 cmd.exe 113 PID 4164 wrote to memory of 2480 4164 cmd.exe 113 PID 4164 wrote to memory of 2480 4164 cmd.exe 113 PID 4508 wrote to memory of 3320 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 114 PID 4508 wrote to memory of 3320 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 114 PID 4508 wrote to memory of 3320 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 114 PID 4508 wrote to memory of 3936 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 115 PID 4508 wrote to memory of 3936 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 115 PID 4508 wrote to memory of 3936 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 115 PID 4508 wrote to memory of 1180 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 116 PID 4508 wrote to memory of 1180 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 116 PID 4508 wrote to memory of 1180 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 116 PID 4508 wrote to memory of 1788 4508 2024091396152c464108ec733320913981e12c2cvirlock.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exe"C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\HEEgQcEE\DWMgscMs.exe"C:\Users\Admin\HEEgQcEE\DWMgscMs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4928
-
-
C:\ProgramData\JaQwYgII\egskwEUg.exe"C:\ProgramData\JaQwYgII\egskwEUg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1408
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"8⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"10⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"12⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"14⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"16⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"18⤵
- System Location Discovery: System Language Discovery
PID:336 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"20⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"22⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"24⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"26⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"28⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"30⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"32⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock33⤵PID:2276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"34⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock35⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"36⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock37⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"38⤵
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock39⤵PID:856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"40⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock41⤵PID:2584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"42⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock43⤵PID:896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"44⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock45⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"46⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock47⤵PID:3248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"48⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock49⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"50⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock51⤵
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"52⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock53⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"54⤵PID:3500
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock55⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"56⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock57⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"58⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock59⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"60⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock61⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"62⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock63⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"64⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock65⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"66⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock67⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"68⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock69⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"70⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock71⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"72⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock73⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"74⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock75⤵PID:948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"76⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock77⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"78⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock79⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"80⤵PID:184
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock81⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"82⤵
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock83⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"84⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock85⤵PID:512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"86⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock87⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"88⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock89⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"90⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock91⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"92⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock93⤵PID:1392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"94⤵PID:3652
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock95⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"96⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock97⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"98⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock99⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"100⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock101⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"102⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock103⤵PID:4532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"104⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock105⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"106⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock107⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"108⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock109⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"110⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock111⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"112⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock113⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"114⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock115⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"116⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock117⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"118⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock119⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"120⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock121⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024091396152c464108ec733320913981e12c2cvirlock"122⤵PID:680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-