Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 06:22
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe
-
Size
262KB
-
MD5
06f86b3751be57a687683a0ef218e1d6
-
SHA1
e681eb1e555aaca0b855038aea0acbb321dac0e2
-
SHA256
764042b36c584f75bbf43a5e4a8a22013cf3b7c6bf571056cfc648f99514d8b9
-
SHA512
dfd640bf3ca90ed4d5d40c2ee747b7bdd003547c633a10bfa88f17bc32e90a3251f4987d6cb12e29d1704e908bb002467e96e73d8eae8c32a9737657aef2de42
-
SSDEEP
6144:HnGJvGd5dNTrDJvRhz13mBQvqt8fzvkOpqcGQ4SFbq75eLoe42F:HcydNTrDBz13Lqt2vkOpkBmq7EoJ2F
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation kckIwMYg.exe -
Executes dropped EXE 2 IoCs
pid Process 5112 kckIwMYg.exe 4240 NeIwQgko.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kckIwMYg.exe = "C:\\Users\\Admin\\UGYYsEII\\kckIwMYg.exe" 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NeIwQgko.exe = "C:\\ProgramData\\bUwEcEAU\\NeIwQgko.exe" 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kckIwMYg.exe = "C:\\Users\\Admin\\UGYYsEII\\kckIwMYg.exe" kckIwMYg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NeIwQgko.exe = "C:\\ProgramData\\bUwEcEAU\\NeIwQgko.exe" NeIwQgko.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4592 reg.exe 3120 reg.exe 2948 reg.exe 3544 Process not Found 4112 reg.exe 2428 reg.exe 4480 Process not Found 3052 reg.exe 744 reg.exe 3656 reg.exe 2544 Process not Found 1300 Process not Found 220 reg.exe 1140 reg.exe 2144 reg.exe 2104 reg.exe 4628 reg.exe 2132 reg.exe 3660 reg.exe 3296 reg.exe 2268 reg.exe 4104 reg.exe 3292 reg.exe 1140 reg.exe 1908 reg.exe 1180 reg.exe 3656 Process not Found 928 reg.exe 5024 Process not Found 1648 reg.exe 4288 reg.exe 2492 reg.exe 2588 reg.exe 4364 reg.exe 456 reg.exe 1040 reg.exe 4520 reg.exe 1328 reg.exe 1164 reg.exe 2784 reg.exe 4484 reg.exe 3796 reg.exe 388 reg.exe 708 reg.exe 1108 reg.exe 2760 reg.exe 624 Process not Found 3156 reg.exe 3688 reg.exe 1112 reg.exe 1584 reg.exe 4752 reg.exe 3608 Process not Found 1432 reg.exe 320 reg.exe 2088 reg.exe 4524 reg.exe 880 reg.exe 2516 reg.exe 3128 reg.exe 4428 reg.exe 1648 reg.exe 4712 reg.exe 2524 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4428 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4428 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4428 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4428 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2084 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2084 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2084 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2084 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3932 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3932 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3932 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3932 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4768 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4768 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4768 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 4768 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1040 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1040 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1040 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1040 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1496 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1496 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1496 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1496 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3148 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3148 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3148 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 3148 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1240 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1240 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1240 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1240 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1512 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1512 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1512 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1512 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2724 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2724 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2724 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 2724 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1604 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1604 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1604 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1604 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1628 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1628 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1628 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1628 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1640 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1640 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1640 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 1640 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5112 kckIwMYg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe 5112 kckIwMYg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 5112 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 86 PID 4488 wrote to memory of 5112 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 86 PID 4488 wrote to memory of 5112 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 86 PID 4488 wrote to memory of 4240 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 87 PID 4488 wrote to memory of 4240 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 87 PID 4488 wrote to memory of 4240 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 87 PID 4488 wrote to memory of 2688 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 88 PID 4488 wrote to memory of 2688 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 88 PID 4488 wrote to memory of 2688 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 88 PID 4488 wrote to memory of 1908 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 90 PID 4488 wrote to memory of 1908 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 90 PID 4488 wrote to memory of 1908 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 90 PID 4488 wrote to memory of 928 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 91 PID 4488 wrote to memory of 928 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 91 PID 4488 wrote to memory of 928 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 91 PID 4488 wrote to memory of 2912 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 92 PID 4488 wrote to memory of 2912 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 92 PID 4488 wrote to memory of 2912 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 92 PID 4488 wrote to memory of 3028 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 93 PID 4488 wrote to memory of 3028 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 93 PID 4488 wrote to memory of 3028 4488 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 93 PID 2688 wrote to memory of 244 2688 cmd.exe 98 PID 2688 wrote to memory of 244 2688 cmd.exe 98 PID 2688 wrote to memory of 244 2688 cmd.exe 98 PID 3028 wrote to memory of 916 3028 cmd.exe 99 PID 3028 wrote to memory of 916 3028 cmd.exe 99 PID 3028 wrote to memory of 916 3028 cmd.exe 99 PID 244 wrote to memory of 2352 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 100 PID 244 wrote to memory of 2352 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 100 PID 244 wrote to memory of 2352 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 100 PID 2352 wrote to memory of 4404 2352 cmd.exe 102 PID 2352 wrote to memory of 4404 2352 cmd.exe 102 PID 2352 wrote to memory of 4404 2352 cmd.exe 102 PID 244 wrote to memory of 1040 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 103 PID 244 wrote to memory of 1040 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 103 PID 244 wrote to memory of 1040 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 103 PID 244 wrote to memory of 5064 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 104 PID 244 wrote to memory of 5064 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 104 PID 244 wrote to memory of 5064 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 104 PID 244 wrote to memory of 3076 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 105 PID 244 wrote to memory of 3076 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 105 PID 244 wrote to memory of 3076 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 105 PID 244 wrote to memory of 4692 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 106 PID 244 wrote to memory of 4692 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 106 PID 244 wrote to memory of 4692 244 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 106 PID 4692 wrote to memory of 804 4692 cmd.exe 111 PID 4692 wrote to memory of 804 4692 cmd.exe 111 PID 4692 wrote to memory of 804 4692 cmd.exe 111 PID 4404 wrote to memory of 3012 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 112 PID 4404 wrote to memory of 3012 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 112 PID 4404 wrote to memory of 3012 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 112 PID 3012 wrote to memory of 4428 3012 cmd.exe 114 PID 3012 wrote to memory of 4428 3012 cmd.exe 114 PID 3012 wrote to memory of 4428 3012 cmd.exe 114 PID 4404 wrote to memory of 2104 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 115 PID 4404 wrote to memory of 2104 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 115 PID 4404 wrote to memory of 2104 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 115 PID 4404 wrote to memory of 2488 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 116 PID 4404 wrote to memory of 2488 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 116 PID 4404 wrote to memory of 2488 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 116 PID 4404 wrote to memory of 4596 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 117 PID 4404 wrote to memory of 4596 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 117 PID 4404 wrote to memory of 4596 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 117 PID 4404 wrote to memory of 1656 4404 2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\UGYYsEII\kckIwMYg.exe"C:\Users\Admin\UGYYsEII\kckIwMYg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5112
-
-
C:\ProgramData\bUwEcEAU\NeIwQgko.exe"C:\ProgramData\bUwEcEAU\NeIwQgko.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4240
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"8⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"10⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"12⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"14⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"16⤵
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"18⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"20⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"22⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"24⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"26⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"28⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"30⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"32⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock33⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"34⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock35⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"36⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock37⤵PID:2580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"38⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock39⤵PID:100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"40⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock41⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"42⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock43⤵PID:3044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"44⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock45⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"46⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock47⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"48⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock49⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"50⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock51⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"52⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock53⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"54⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock55⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"56⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock57⤵PID:2628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"58⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock59⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"60⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock61⤵PID:2020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"62⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock63⤵PID:2392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"64⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock65⤵PID:624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"66⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock67⤵
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"68⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock69⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"70⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock71⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"72⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock73⤵PID:4104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"74⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock75⤵PID:3112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"76⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock77⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"78⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock79⤵PID:716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"80⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock81⤵PID:1872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"82⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock83⤵PID:1784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"84⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock85⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"86⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock87⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"88⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock89⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"90⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock91⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"92⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock93⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"94⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock95⤵PID:760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"96⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock97⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"98⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock99⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"100⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock101⤵PID:1044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"102⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock103⤵PID:2236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"104⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock105⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"106⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock107⤵PID:3128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"108⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock109⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"110⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock111⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"112⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock113⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"114⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock115⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"116⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock117⤵PID:1636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"118⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock119⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"120⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock121⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-15_06f86b3751be57a687683a0ef218e1d6_virlock"122⤵PID:1624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-