Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
20240913aff947a392882d6abeaa90330f647cd8virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240913aff947a392882d6abeaa90330f647cd8virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240913aff947a392882d6abeaa90330f647cd8virlock.exe
-
Size
192KB
-
MD5
aff947a392882d6abeaa90330f647cd8
-
SHA1
f13f3cc8392466822894409344866064830203fd
-
SHA256
cafbd0fa597ec2d3a5380bed64c1248e6515337d1c296540c67b9b79c303df0c
-
SHA512
23eb4e922ca480654f60127d781f606320e99abbade517f161670f881a959d522198683fc08b26ba7316c2cfd371189474eed86363e91df487a2ca7d227026c5
-
SSDEEP
3072:xXtCcXcL97sQy5OKXyaF2WoykWJTm0AWWg84eGhRpRSd:xXMyYuT5OKiaFjowSF4bTSd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\Geo\Nation fewcwEMo.exe -
Executes dropped EXE 2 IoCs
pid Process 2668 fewcwEMo.exe 2548 BesEMgow.exe -
Loads dropped DLL 20 IoCs
pid Process 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\fewcwEMo.exe = "C:\\Users\\Admin\\aigsIUkA\\fewcwEMo.exe" 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BesEMgow.exe = "C:\\ProgramData\\CIoQYMoo\\BesEMgow.exe" 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\fewcwEMo.exe = "C:\\Users\\Admin\\aigsIUkA\\fewcwEMo.exe" fewcwEMo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BesEMgow.exe = "C:\\ProgramData\\CIoQYMoo\\BesEMgow.exe" BesEMgow.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\GykUgwEM.exe = "C:\\Users\\Admin\\MwYwMYgU\\GykUgwEM.exe" 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ZEgMUogk.exe = "C:\\ProgramData\\zUosEUso\\ZEgMUogk.exe" 20240913aff947a392882d6abeaa90330f647cd8virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico fewcwEMo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3060 2708 WerFault.exe 237 2384 2724 WerFault.exe 236 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240913aff947a392882d6abeaa90330f647cd8virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 580 reg.exe 2740 reg.exe 2824 reg.exe 1736 reg.exe 2704 reg.exe 3004 reg.exe 1332 reg.exe 1268 reg.exe 2688 reg.exe 2528 reg.exe 1000 reg.exe 2240 reg.exe 2692 reg.exe 1384 reg.exe 2400 reg.exe 2676 reg.exe 2840 reg.exe 2500 reg.exe 2088 reg.exe 924 reg.exe 2564 reg.exe 3068 reg.exe 2988 reg.exe 1304 reg.exe 1720 reg.exe 3004 reg.exe 1692 reg.exe 1952 reg.exe 2352 reg.exe 2124 reg.exe 1084 reg.exe 1856 reg.exe 1144 reg.exe 2424 reg.exe 2164 reg.exe 2936 reg.exe 2428 reg.exe 2824 reg.exe 2756 reg.exe 924 reg.exe 2124 reg.exe 1788 reg.exe 2572 reg.exe 1056 reg.exe 1092 reg.exe 2936 reg.exe 2024 reg.exe 2876 reg.exe 1508 reg.exe 1816 reg.exe 2716 reg.exe 888 reg.exe 1276 reg.exe 1776 reg.exe 2700 reg.exe 1928 reg.exe 2996 reg.exe 1992 reg.exe 3044 reg.exe 1788 reg.exe 1304 reg.exe 1692 reg.exe 2644 reg.exe 2484 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2180 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2180 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2004 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2004 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2812 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2812 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2196 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2196 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1584 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1584 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2884 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2884 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1644 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1644 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2680 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2680 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 640 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 640 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 3060 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 3060 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 700 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 700 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2636 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2636 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 760 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 760 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2024 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2024 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2020 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2020 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2524 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2524 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 672 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 672 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 836 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 836 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1940 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1940 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 3028 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 3028 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 996 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 996 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2352 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2352 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2856 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2856 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2468 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2468 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2820 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2820 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1748 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1748 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2892 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2892 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2416 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 2416 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1644 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 1644 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 676 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 676 20240913aff947a392882d6abeaa90330f647cd8virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2668 fewcwEMo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe 2668 fewcwEMo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2668 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 30 PID 1788 wrote to memory of 2668 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 30 PID 1788 wrote to memory of 2668 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 30 PID 1788 wrote to memory of 2668 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 30 PID 1788 wrote to memory of 2548 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 31 PID 1788 wrote to memory of 2548 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 31 PID 1788 wrote to memory of 2548 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 31 PID 1788 wrote to memory of 2548 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 31 PID 1788 wrote to memory of 2472 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 32 PID 1788 wrote to memory of 2472 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 32 PID 1788 wrote to memory of 2472 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 32 PID 1788 wrote to memory of 2472 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 32 PID 2472 wrote to memory of 2740 2472 cmd.exe 34 PID 2472 wrote to memory of 2740 2472 cmd.exe 34 PID 2472 wrote to memory of 2740 2472 cmd.exe 34 PID 2472 wrote to memory of 2740 2472 cmd.exe 34 PID 1788 wrote to memory of 2840 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 35 PID 1788 wrote to memory of 2840 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 35 PID 1788 wrote to memory of 2840 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 35 PID 1788 wrote to memory of 2840 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 35 PID 1788 wrote to memory of 2844 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 36 PID 1788 wrote to memory of 2844 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 36 PID 1788 wrote to memory of 2844 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 36 PID 1788 wrote to memory of 2844 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 36 PID 1788 wrote to memory of 2884 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 37 PID 1788 wrote to memory of 2884 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 37 PID 1788 wrote to memory of 2884 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 37 PID 1788 wrote to memory of 2884 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 37 PID 1788 wrote to memory of 2912 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 39 PID 1788 wrote to memory of 2912 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 39 PID 1788 wrote to memory of 2912 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 39 PID 1788 wrote to memory of 2912 1788 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 39 PID 2912 wrote to memory of 2932 2912 cmd.exe 43 PID 2912 wrote to memory of 2932 2912 cmd.exe 43 PID 2912 wrote to memory of 2932 2912 cmd.exe 43 PID 2912 wrote to memory of 2932 2912 cmd.exe 43 PID 2740 wrote to memory of 1716 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 44 PID 2740 wrote to memory of 1716 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 44 PID 2740 wrote to memory of 1716 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 44 PID 2740 wrote to memory of 1716 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 44 PID 1716 wrote to memory of 2180 1716 cmd.exe 46 PID 1716 wrote to memory of 2180 1716 cmd.exe 46 PID 1716 wrote to memory of 2180 1716 cmd.exe 46 PID 1716 wrote to memory of 2180 1716 cmd.exe 46 PID 2740 wrote to memory of 2400 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 47 PID 2740 wrote to memory of 2400 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 47 PID 2740 wrote to memory of 2400 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 47 PID 2740 wrote to memory of 2400 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 47 PID 2740 wrote to memory of 672 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 48 PID 2740 wrote to memory of 672 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 48 PID 2740 wrote to memory of 672 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 48 PID 2740 wrote to memory of 672 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 48 PID 2740 wrote to memory of 1472 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 49 PID 2740 wrote to memory of 1472 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 49 PID 2740 wrote to memory of 1472 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 49 PID 2740 wrote to memory of 1472 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 49 PID 2740 wrote to memory of 1920 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 51 PID 2740 wrote to memory of 1920 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 51 PID 2740 wrote to memory of 1920 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 51 PID 2740 wrote to memory of 1920 2740 20240913aff947a392882d6abeaa90330f647cd8virlock.exe 51 PID 1920 wrote to memory of 1620 1920 cmd.exe 55 PID 1920 wrote to memory of 1620 1920 cmd.exe 55 PID 1920 wrote to memory of 1620 1920 cmd.exe 55 PID 1920 wrote to memory of 1620 1920 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exe"C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\aigsIUkA\fewcwEMo.exe"C:\Users\Admin\aigsIUkA\fewcwEMo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2668
-
-
C:\ProgramData\CIoQYMoo\BesEMgow.exe"C:\ProgramData\CIoQYMoo\BesEMgow.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"6⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"8⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"10⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"12⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"14⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"16⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"18⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"20⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"22⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"24⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"26⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"28⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"30⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"32⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"34⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock35⤵
- Adds Run key to start application
PID:3000 -
C:\Users\Admin\MwYwMYgU\GykUgwEM.exe"C:\Users\Admin\MwYwMYgU\GykUgwEM.exe"36⤵PID:2724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 3637⤵
- Program crash
PID:2384
-
-
-
C:\ProgramData\zUosEUso\ZEgMUogk.exe"C:\ProgramData\zUosEUso\ZEgMUogk.exe"36⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 3637⤵
- Program crash
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"36⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"38⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"40⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"42⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"44⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"46⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock47⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"48⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"50⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"52⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"54⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"56⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"58⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"60⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"62⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"64⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock65⤵
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"66⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock67⤵PID:640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"68⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock69⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"70⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock71⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"72⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock73⤵PID:2524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"74⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock75⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"76⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock77⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"78⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock79⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"80⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock81⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"82⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock83⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"84⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock85⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"86⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock87⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"88⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock89⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"90⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock91⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"92⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock93⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"94⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock95⤵PID:800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"96⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock97⤵PID:2124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"98⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock99⤵PID:788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"100⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock101⤵PID:640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"102⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock103⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"104⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock105⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"106⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock107⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"108⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock109⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"110⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock111⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"112⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock113⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"114⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock115⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"116⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock117⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"118⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock119⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"120⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock.exeC:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock121⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240913aff947a392882d6abeaa90330f647cd8virlock"122⤵PID:2852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-