Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
-
Size
116KB
-
MD5
ed70fb782a4e3b26dd15b305ab4bc759
-
SHA1
05dc573207379f0fbe568d882fb1bd5d2d0f7300
-
SHA256
36a8ed42def4507a81b435292ad20bb61c6a2d54374747b18599df5a7a76b696
-
SHA512
e7d0801c9f6a87e29b4569114a4d1b1fd70b016922c778223633772d6f07964ebdebfb12b9cfc4f1d8a148d15d9d32b0d1d80b0d4ba378d053e49897f1db9df3
-
SSDEEP
3072:CbpAVdYIYQA2CKkJli8pBVWBb9u55OdjH:CICKGrpUk550
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation FYUkwUMc.exe -
Executes dropped EXE 2 IoCs
pid Process 2380 FYUkwUMc.exe 2792 BCkUMsAw.exe -
Loads dropped DLL 20 IoCs
pid Process 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\FYUkwUMc.exe = "C:\\Users\\Admin\\aUcAYAwA\\FYUkwUMc.exe" 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BCkUMsAw.exe = "C:\\ProgramData\\CEUwYkMQ\\BCkUMsAw.exe" 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\FYUkwUMc.exe = "C:\\Users\\Admin\\aUcAYAwA\\FYUkwUMc.exe" FYUkwUMc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BCkUMsAw.exe = "C:\\ProgramData\\CEUwYkMQ\\BCkUMsAw.exe" BCkUMsAw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 556 reg.exe 1828 reg.exe 704 reg.exe 2016 reg.exe 2996 reg.exe 2348 reg.exe 1172 reg.exe 2912 reg.exe 2500 reg.exe 556 reg.exe 2916 reg.exe 2184 reg.exe 2436 reg.exe 1860 reg.exe 2988 reg.exe 476 reg.exe 1660 reg.exe 616 reg.exe 2808 reg.exe 2004 reg.exe 576 reg.exe 2716 reg.exe 2600 reg.exe 2388 reg.exe 2988 reg.exe 700 reg.exe 2100 reg.exe 1948 reg.exe 2676 reg.exe 804 reg.exe 1684 reg.exe 1520 reg.exe 1228 reg.exe 3032 reg.exe 1608 reg.exe 1996 reg.exe 2656 reg.exe 316 reg.exe 2656 reg.exe 1256 reg.exe 2340 reg.exe 1780 reg.exe 1808 reg.exe 2580 reg.exe 2100 reg.exe 2244 reg.exe 1416 reg.exe 1048 reg.exe 1776 reg.exe 2468 reg.exe 1532 reg.exe 2928 reg.exe 1448 reg.exe 2968 reg.exe 1828 reg.exe 1476 reg.exe 2076 reg.exe 1596 reg.exe 1644 reg.exe 956 reg.exe 2888 reg.exe 2288 reg.exe 1960 reg.exe 3000 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2240 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2240 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1292 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1292 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1752 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1752 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1544 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1544 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 572 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 572 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2920 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2920 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2840 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2840 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1168 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1168 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2368 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2368 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 616 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 616 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2516 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2516 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2216 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2216 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1680 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1680 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 372 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 372 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2012 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2012 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1568 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1568 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2104 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2104 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2480 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2480 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1484 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1484 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3012 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3012 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1376 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1376 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2824 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2824 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1612 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1612 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1756 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1756 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2748 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2748 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2340 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2340 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2404 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2404 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 764 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 764 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2724 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2724 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2380 FYUkwUMc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe 2380 FYUkwUMc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1992 wrote to memory of 2380 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 30 PID 1992 wrote to memory of 2380 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 30 PID 1992 wrote to memory of 2380 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 30 PID 1992 wrote to memory of 2380 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 30 PID 1992 wrote to memory of 2792 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 31 PID 1992 wrote to memory of 2792 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 31 PID 1992 wrote to memory of 2792 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 31 PID 1992 wrote to memory of 2792 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 31 PID 1992 wrote to memory of 2736 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 32 PID 1992 wrote to memory of 2736 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 32 PID 1992 wrote to memory of 2736 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 32 PID 1992 wrote to memory of 2736 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 32 PID 2736 wrote to memory of 3032 2736 cmd.exe 34 PID 2736 wrote to memory of 3032 2736 cmd.exe 34 PID 2736 wrote to memory of 3032 2736 cmd.exe 34 PID 2736 wrote to memory of 3032 2736 cmd.exe 34 PID 1992 wrote to memory of 2912 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 35 PID 1992 wrote to memory of 2912 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 35 PID 1992 wrote to memory of 2912 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 35 PID 1992 wrote to memory of 2912 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 35 PID 1992 wrote to memory of 2168 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 36 PID 1992 wrote to memory of 2168 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 36 PID 1992 wrote to memory of 2168 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 36 PID 1992 wrote to memory of 2168 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 36 PID 1992 wrote to memory of 2860 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 38 PID 1992 wrote to memory of 2860 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 38 PID 1992 wrote to memory of 2860 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 38 PID 1992 wrote to memory of 2860 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 38 PID 1992 wrote to memory of 2716 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 41 PID 1992 wrote to memory of 2716 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 41 PID 1992 wrote to memory of 2716 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 41 PID 1992 wrote to memory of 2716 1992 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 41 PID 2716 wrote to memory of 2724 2716 cmd.exe 43 PID 2716 wrote to memory of 2724 2716 cmd.exe 43 PID 2716 wrote to memory of 2724 2716 cmd.exe 43 PID 2716 wrote to memory of 2724 2716 cmd.exe 43 PID 3032 wrote to memory of 1496 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 44 PID 3032 wrote to memory of 1496 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 44 PID 3032 wrote to memory of 1496 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 44 PID 3032 wrote to memory of 1496 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 44 PID 1496 wrote to memory of 2240 1496 cmd.exe 46 PID 1496 wrote to memory of 2240 1496 cmd.exe 46 PID 1496 wrote to memory of 2240 1496 cmd.exe 46 PID 1496 wrote to memory of 2240 1496 cmd.exe 46 PID 3032 wrote to memory of 1624 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 47 PID 3032 wrote to memory of 1624 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 47 PID 3032 wrote to memory of 1624 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 47 PID 3032 wrote to memory of 1624 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 47 PID 3032 wrote to memory of 2996 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 48 PID 3032 wrote to memory of 2996 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 48 PID 3032 wrote to memory of 2996 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 48 PID 3032 wrote to memory of 2996 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 48 PID 3032 wrote to memory of 1032 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 50 PID 3032 wrote to memory of 1032 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 50 PID 3032 wrote to memory of 1032 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 50 PID 3032 wrote to memory of 1032 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 50 PID 3032 wrote to memory of 2876 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 52 PID 3032 wrote to memory of 2876 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 52 PID 3032 wrote to memory of 2876 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 52 PID 3032 wrote to memory of 2876 3032 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 52 PID 2876 wrote to memory of 2960 2876 cmd.exe 55 PID 2876 wrote to memory of 2960 2876 cmd.exe 55 PID 2876 wrote to memory of 2960 2876 cmd.exe 55 PID 2876 wrote to memory of 2960 2876 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe"C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\aUcAYAwA\FYUkwUMc.exe"C:\Users\Admin\aUcAYAwA\FYUkwUMc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2380
-
-
C:\ProgramData\CEUwYkMQ\BCkUMsAw.exe"C:\ProgramData\CEUwYkMQ\BCkUMsAw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2792
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"6⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"8⤵
- System Location Discovery: System Language Discovery
PID:576 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"10⤵
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"12⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"14⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"16⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"18⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"20⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"22⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"24⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"26⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"28⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"30⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"32⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"34⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"36⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"38⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"40⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"42⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock43⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"44⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"46⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"48⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"50⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"52⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"54⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"56⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock57⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"58⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"60⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"62⤵
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"64⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock65⤵PID:588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"66⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock67⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"68⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock69⤵PID:2128
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"70⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock71⤵PID:768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"72⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock73⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"74⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock75⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"76⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock77⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"78⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock79⤵PID:2984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"80⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock81⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"82⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock83⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"84⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock85⤵PID:1228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"86⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock87⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"88⤵
- System Location Discovery: System Language Discovery
PID:492 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock89⤵PID:348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"90⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock91⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"92⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock93⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"94⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock95⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"96⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock97⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"98⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock99⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"100⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock101⤵PID:2956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"102⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock103⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"104⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock105⤵PID:1100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"106⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock107⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"108⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock109⤵
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"110⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock111⤵PID:2516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"112⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock113⤵PID:2460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"114⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock115⤵PID:1996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"116⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock117⤵PID:2052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"118⤵
- System Location Discovery: System Language Discovery
PID:560 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock119⤵
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"120⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock121⤵PID:3056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"122⤵
- System Location Discovery: System Language Discovery
PID:2636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-