Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe
-
Size
116KB
-
MD5
ed70fb782a4e3b26dd15b305ab4bc759
-
SHA1
05dc573207379f0fbe568d882fb1bd5d2d0f7300
-
SHA256
36a8ed42def4507a81b435292ad20bb61c6a2d54374747b18599df5a7a76b696
-
SHA512
e7d0801c9f6a87e29b4569114a4d1b1fd70b016922c778223633772d6f07964ebdebfb12b9cfc4f1d8a148d15d9d32b0d1d80b0d4ba378d053e49897f1db9df3
-
SSDEEP
3072:CbpAVdYIYQA2CKkJli8pBVWBb9u55OdjH:CICKGrpUk550
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (88) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation vkIIUwcc.exe -
Executes dropped EXE 2 IoCs
pid Process 1800 lMgYUsME.exe 3460 vkIIUwcc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lMgYUsME.exe = "C:\\Users\\Admin\\XmoQUcEc\\lMgYUsME.exe" 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vkIIUwcc.exe = "C:\\ProgramData\\jqIEEkkY\\vkIIUwcc.exe" 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\vkIIUwcc.exe = "C:\\ProgramData\\jqIEEkkY\\vkIIUwcc.exe" vkIIUwcc.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lMgYUsME.exe = "C:\\Users\\Admin\\XmoQUcEc\\lMgYUsME.exe" lMgYUsME.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe vkIIUwcc.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe vkIIUwcc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vkIIUwcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1720 reg.exe 2084 reg.exe 632 reg.exe 312 reg.exe 548 reg.exe 1784 reg.exe 1524 reg.exe 2352 reg.exe 4704 reg.exe 1100 reg.exe 4540 reg.exe 1556 reg.exe 1920 reg.exe 2540 reg.exe 2188 reg.exe 4104 reg.exe 2016 reg.exe 2092 reg.exe 4540 reg.exe 828 reg.exe 1084 reg.exe 1932 reg.exe 3192 reg.exe 4780 reg.exe 1828 reg.exe 916 reg.exe 8 reg.exe 3576 reg.exe 4228 reg.exe 2820 reg.exe 2840 reg.exe 3900 reg.exe 4508 reg.exe 4476 reg.exe 3456 reg.exe 4248 reg.exe 2476 reg.exe 2884 reg.exe 4224 reg.exe 220 reg.exe 4068 reg.exe 2820 reg.exe 944 reg.exe 1416 reg.exe 3504 reg.exe 760 reg.exe 2256 reg.exe 4192 reg.exe 2752 reg.exe 2016 reg.exe 3904 reg.exe 3548 reg.exe 3616 reg.exe 1440 reg.exe 3728 reg.exe 4400 reg.exe 3676 reg.exe 3836 reg.exe 4824 reg.exe 4740 reg.exe 2860 reg.exe 3212 reg.exe 2352 reg.exe 4956 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 876 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 876 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 876 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 876 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2452 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1304 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1304 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1304 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1304 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5020 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5020 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5020 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5020 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2180 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2180 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2180 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2180 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2968 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2968 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2968 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 2968 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5068 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5068 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5068 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 5068 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1100 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1100 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1100 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1100 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4308 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4704 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4704 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4704 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 4704 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1296 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1296 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1296 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 1296 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3792 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3792 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3792 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 3792 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3460 vkIIUwcc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe 3460 vkIIUwcc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 1800 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 82 PID 2632 wrote to memory of 1800 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 82 PID 2632 wrote to memory of 1800 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 82 PID 2632 wrote to memory of 3460 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 83 PID 2632 wrote to memory of 3460 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 83 PID 2632 wrote to memory of 3460 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 83 PID 2632 wrote to memory of 1132 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 84 PID 2632 wrote to memory of 1132 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 84 PID 2632 wrote to memory of 1132 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 84 PID 2632 wrote to memory of 4508 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 86 PID 2632 wrote to memory of 4508 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 86 PID 2632 wrote to memory of 4508 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 86 PID 2632 wrote to memory of 4540 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 87 PID 2632 wrote to memory of 4540 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 87 PID 2632 wrote to memory of 4540 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 87 PID 2632 wrote to memory of 4564 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 88 PID 2632 wrote to memory of 4564 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 88 PID 2632 wrote to memory of 4564 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 88 PID 2632 wrote to memory of 1096 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 89 PID 2632 wrote to memory of 1096 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 89 PID 2632 wrote to memory of 1096 2632 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 89 PID 1132 wrote to memory of 2356 1132 cmd.exe 94 PID 1132 wrote to memory of 2356 1132 cmd.exe 94 PID 1132 wrote to memory of 2356 1132 cmd.exe 94 PID 1096 wrote to memory of 1188 1096 cmd.exe 95 PID 1096 wrote to memory of 1188 1096 cmd.exe 95 PID 1096 wrote to memory of 1188 1096 cmd.exe 95 PID 2356 wrote to memory of 3372 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 96 PID 2356 wrote to memory of 3372 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 96 PID 2356 wrote to memory of 3372 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 96 PID 2356 wrote to memory of 2180 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 98 PID 2356 wrote to memory of 2180 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 98 PID 2356 wrote to memory of 2180 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 98 PID 2356 wrote to memory of 1340 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 99 PID 2356 wrote to memory of 1340 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 99 PID 2356 wrote to memory of 1340 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 99 PID 2356 wrote to memory of 1716 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 100 PID 2356 wrote to memory of 1716 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 100 PID 2356 wrote to memory of 1716 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 100 PID 2356 wrote to memory of 3852 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 101 PID 2356 wrote to memory of 3852 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 101 PID 2356 wrote to memory of 3852 2356 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 101 PID 3372 wrote to memory of 3076 3372 cmd.exe 106 PID 3372 wrote to memory of 3076 3372 cmd.exe 106 PID 3372 wrote to memory of 3076 3372 cmd.exe 106 PID 3852 wrote to memory of 4420 3852 cmd.exe 107 PID 3852 wrote to memory of 4420 3852 cmd.exe 107 PID 3852 wrote to memory of 4420 3852 cmd.exe 107 PID 3076 wrote to memory of 3996 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 108 PID 3076 wrote to memory of 3996 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 108 PID 3076 wrote to memory of 3996 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 108 PID 3076 wrote to memory of 3904 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 110 PID 3076 wrote to memory of 3904 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 110 PID 3076 wrote to memory of 3904 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 110 PID 3076 wrote to memory of 4504 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 111 PID 3076 wrote to memory of 4504 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 111 PID 3076 wrote to memory of 4504 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 111 PID 3076 wrote to memory of 3192 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 112 PID 3076 wrote to memory of 3192 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 112 PID 3076 wrote to memory of 3192 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 112 PID 3076 wrote to memory of 1680 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 113 PID 3076 wrote to memory of 1680 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 113 PID 3076 wrote to memory of 1680 3076 20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe 113 PID 3996 wrote to memory of 876 3996 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe"C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\XmoQUcEc\lMgYUsME.exe"C:\Users\Admin\XmoQUcEc\lMgYUsME.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1800
-
-
C:\ProgramData\jqIEEkkY\vkIIUwcc.exe"C:\ProgramData\jqIEEkkY\vkIIUwcc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"8⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"12⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"14⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"16⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"18⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"20⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"22⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"24⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"26⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"28⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock29⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"30⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"32⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock33⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"34⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock35⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"36⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock37⤵PID:1648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"38⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock39⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"40⤵PID:3632
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock41⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"42⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:3440
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock43⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"44⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock45⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"46⤵
- System Location Discovery: System Language Discovery
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock47⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"48⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock49⤵PID:4260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"50⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock51⤵PID:612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"52⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock53⤵PID:944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"54⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock55⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"56⤵
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock57⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"58⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock59⤵
- System Location Discovery: System Language Discovery
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"60⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock61⤵PID:3200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"62⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock63⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"64⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock65⤵
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"66⤵PID:2828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock67⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"68⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock69⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"70⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock71⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"72⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock73⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"74⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock75⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"76⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock77⤵PID:964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"78⤵PID:2828
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock79⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"80⤵
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock81⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"82⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock83⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"84⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock85⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"86⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock87⤵PID:1416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"88⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock89⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"90⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock91⤵PID:644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"92⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock93⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"94⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock95⤵PID:2752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"96⤵
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock97⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"98⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock99⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"100⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock101⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"102⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock103⤵PID:1136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"104⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock105⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"106⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock107⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"108⤵
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock109⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"110⤵
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock111⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"112⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock113⤵PID:2608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"114⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock115⤵
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"116⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock117⤵PID:1028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"118⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock119⤵PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"120⤵PID:4552
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock.exeC:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock121⤵PID:1168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240919ed70fb782a4e3b26dd15b305ab4bc759virlock"122⤵PID:5004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-