Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe
-
Size
194KB
-
MD5
dec5fb1994d3579b05ee221e5a0d5410
-
SHA1
a61241d9f6162fd2ab9e2263267c7629d8327865
-
SHA256
c4826c9f70993ccd192b0f66c30a1f37f579f88efa3b3c9ff719ddae69b07a10
-
SHA512
b26d406a5eaa60392cf9f6ae6e2a85fbd3333c56a99f45274b221c802f8a7c6a4791d03f3cde6c47d2c34533bb72e713edb69a67d32cf75daa3e596b782236c1
-
SSDEEP
3072:5W5IeUtoX7UK453E9/hgSlWFwZoK0x55yU5mqwfK:wWtoX7K532J+FwZJUgU5mF
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation YkQkMccU.exe -
Executes dropped EXE 2 IoCs
pid Process 2216 YkQkMccU.exe 3128 wUMMMogU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YkQkMccU.exe = "C:\\Users\\Admin\\gwwoYEQk\\YkQkMccU.exe" 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wUMMMogU.exe = "C:\\ProgramData\\sqYYYcYk\\wUMMMogU.exe" 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YkQkMccU.exe = "C:\\Users\\Admin\\gwwoYEQk\\YkQkMccU.exe" YkQkMccU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wUMMMogU.exe = "C:\\ProgramData\\sqYYYcYk\\wUMMMogU.exe" wUMMMogU.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe YkQkMccU.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe YkQkMccU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 5924 reg.exe 2336 reg.exe 5040 reg.exe 6132 reg.exe 872 reg.exe 3312 reg.exe 5288 reg.exe 5172 Process not Found 4956 reg.exe 3540 reg.exe 3600 reg.exe 832 Process not Found 4836 reg.exe 552 Process not Found 4876 Process not Found 2936 reg.exe 2912 reg.exe 5428 reg.exe 5536 reg.exe 2336 reg.exe 3528 reg.exe 5384 reg.exe 2608 Process not Found 4280 reg.exe 4700 reg.exe 3012 reg.exe 3772 reg.exe 1320 reg.exe 2844 Process not Found 5812 reg.exe 1660 reg.exe 2276 reg.exe 1444 reg.exe 2532 reg.exe 5760 reg.exe 4076 reg.exe 4064 reg.exe 4408 reg.exe 4388 reg.exe 1652 reg.exe 5732 reg.exe 5420 reg.exe 4024 reg.exe 4844 reg.exe 3236 reg.exe 1576 reg.exe 5480 reg.exe 3800 reg.exe 1180 reg.exe 4348 reg.exe 1672 reg.exe 5292 reg.exe 4488 Process not Found 4444 reg.exe 5728 reg.exe 984 reg.exe 5324 reg.exe 5932 reg.exe 4548 Process not Found 3528 reg.exe 4872 reg.exe 6104 reg.exe 2504 reg.exe 640 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3800 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3800 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3800 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3800 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 468 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 468 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 468 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 468 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1756 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1756 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1756 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1756 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 976 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 976 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 976 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 976 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2596 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2596 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2596 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2596 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 576 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 576 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 576 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 576 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1032 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1032 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1032 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 1032 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2456 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2456 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2456 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2456 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 396 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 396 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 396 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 396 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2900 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2900 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2900 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 2900 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3300 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3300 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3300 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 3300 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5496 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5496 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5496 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 5496 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4720 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4720 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4720 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 4720 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2216 YkQkMccU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe 2216 YkQkMccU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2216 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 82 PID 4284 wrote to memory of 2216 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 82 PID 4284 wrote to memory of 2216 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 82 PID 4284 wrote to memory of 3128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 83 PID 4284 wrote to memory of 3128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 83 PID 4284 wrote to memory of 3128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 83 PID 4284 wrote to memory of 4168 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 84 PID 4284 wrote to memory of 4168 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 84 PID 4284 wrote to memory of 4168 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 84 PID 4168 wrote to memory of 5284 4168 cmd.exe 86 PID 4168 wrote to memory of 5284 4168 cmd.exe 86 PID 4168 wrote to memory of 5284 4168 cmd.exe 86 PID 4284 wrote to memory of 5612 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 87 PID 4284 wrote to memory of 5612 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 87 PID 4284 wrote to memory of 5612 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 87 PID 4284 wrote to memory of 840 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 88 PID 4284 wrote to memory of 840 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 88 PID 4284 wrote to memory of 840 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 88 PID 4284 wrote to memory of 5128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 89 PID 4284 wrote to memory of 5128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 89 PID 4284 wrote to memory of 5128 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 89 PID 4284 wrote to memory of 4876 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 90 PID 4284 wrote to memory of 4876 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 90 PID 4284 wrote to memory of 4876 4284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 90 PID 4876 wrote to memory of 1884 4876 cmd.exe 95 PID 4876 wrote to memory of 1884 4876 cmd.exe 95 PID 4876 wrote to memory of 1884 4876 cmd.exe 95 PID 5284 wrote to memory of 3272 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 96 PID 5284 wrote to memory of 3272 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 96 PID 5284 wrote to memory of 3272 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 96 PID 3272 wrote to memory of 5728 3272 cmd.exe 98 PID 3272 wrote to memory of 5728 3272 cmd.exe 98 PID 3272 wrote to memory of 5728 3272 cmd.exe 98 PID 5284 wrote to memory of 3972 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 99 PID 5284 wrote to memory of 3972 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 99 PID 5284 wrote to memory of 3972 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 99 PID 5284 wrote to memory of 4188 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 100 PID 5284 wrote to memory of 4188 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 100 PID 5284 wrote to memory of 4188 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 100 PID 5284 wrote to memory of 4264 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 101 PID 5284 wrote to memory of 4264 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 101 PID 5284 wrote to memory of 4264 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 101 PID 5284 wrote to memory of 1160 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 102 PID 5284 wrote to memory of 1160 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 102 PID 5284 wrote to memory of 1160 5284 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 102 PID 1160 wrote to memory of 3992 1160 cmd.exe 107 PID 1160 wrote to memory of 3992 1160 cmd.exe 107 PID 1160 wrote to memory of 3992 1160 cmd.exe 107 PID 5728 wrote to memory of 4476 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 108 PID 5728 wrote to memory of 4476 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 108 PID 5728 wrote to memory of 4476 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 108 PID 4476 wrote to memory of 3800 4476 cmd.exe 110 PID 4476 wrote to memory of 3800 4476 cmd.exe 110 PID 4476 wrote to memory of 3800 4476 cmd.exe 110 PID 5728 wrote to memory of 3528 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 111 PID 5728 wrote to memory of 3528 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 111 PID 5728 wrote to memory of 3528 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 111 PID 5728 wrote to memory of 3676 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 112 PID 5728 wrote to memory of 3676 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 112 PID 5728 wrote to memory of 3676 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 112 PID 5728 wrote to memory of 4912 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 113 PID 5728 wrote to memory of 4912 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 113 PID 5728 wrote to memory of 4912 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 113 PID 5728 wrote to memory of 1584 5728 2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\gwwoYEQk\YkQkMccU.exe"C:\Users\Admin\gwwoYEQk\YkQkMccU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2216
-
-
C:\ProgramData\sqYYYcYk\wUMMMogU.exe"C:\ProgramData\sqYYYcYk\wUMMMogU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3128
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"8⤵PID:5808
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"10⤵PID:5628
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"12⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"14⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"16⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"18⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"20⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"22⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"24⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"26⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"28⤵PID:4600
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:5496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"30⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"32⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock33⤵PID:5516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"34⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock35⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"36⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock37⤵PID:5428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"38⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock39⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"40⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock41⤵PID:5184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"42⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock43⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"44⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock45⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"46⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock47⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"48⤵PID:5192
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock49⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"50⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock51⤵PID:5712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"52⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock53⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"54⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock55⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"56⤵PID:5632
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock57⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"58⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock59⤵PID:2892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"60⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock61⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"62⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock63⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"64⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock65⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"66⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock67⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"68⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock69⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"70⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock71⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"72⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock73⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"74⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock75⤵PID:3800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"76⤵PID:2280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:5480
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock77⤵PID:6020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"78⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock79⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"80⤵PID:5972
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock81⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"82⤵PID:6000
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock83⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"84⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock85⤵
- System Location Discovery: System Language Discovery
PID:5452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"86⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock87⤵PID:5432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"88⤵PID:4356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:5304
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock89⤵PID:1436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"90⤵PID:4284
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock91⤵PID:5148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"92⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock93⤵PID:1268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"94⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock95⤵PID:3544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"96⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock97⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"98⤵PID:5624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock99⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"100⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock101⤵PID:2608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"102⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock103⤵
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"104⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock105⤵PID:5436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"106⤵PID:3528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock107⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"108⤵PID:1324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock109⤵PID:5524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"110⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock111⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"112⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock113⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"114⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock115⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"116⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock117⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"118⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock119⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"120⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock121⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-18_dec5fb1994d3579b05ee221e5a0d5410_virlock"122⤵PID:692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-