Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe
-
Size
742KB
-
MD5
c2f2ce5f0660afce6129275ef6e8d5aa
-
SHA1
2d7340dabae0b25c7c74d1e5fedb067c3b81bb35
-
SHA256
3ca3cf4fd5903f075c9d524a4cf3cb07e3cb4d04200c887bb7fd8ebd2fd94a6c
-
SHA512
031d53cfab712c2ca31f7c0575048773c9c2760eee13ae944561ef6a3c0fc75742c8cec727c02983bd73c41802eba860410130d918b7850be4f01f7f517e4888
-
SSDEEP
12288:8jgpOimob/2G4R+/H+l9gAlKOyNU10IW2ZZe9hQbJB+BR2x4fl7ttiLU7xKn:+gpP/29+fI6zOyNU10IWwQ9h8BNx4t72
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 33 5040 Process not Found 37 5040 Process not Found 39 5040 Process not Found 41 5040 Process not Found 43 5040 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation mIcAkccY.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 mIcAkccY.exe 244 JIcsYgAg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mIcAkccY.exe = "C:\\Users\\Admin\\IuQcEkQs\\mIcAkccY.exe" 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JIcsYgAg.exe = "C:\\ProgramData\\SQEsMsMk\\JIcsYgAg.exe" 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mIcAkccY.exe = "C:\\Users\\Admin\\IuQcEkQs\\mIcAkccY.exe" mIcAkccY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\JIcsYgAg.exe = "C:\\ProgramData\\SQEsMsMk\\JIcsYgAg.exe" JIcsYgAg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4516 reg.exe 1792 reg.exe 1936 reg.exe 4968 reg.exe 3488 reg.exe 2676 reg.exe 1792 reg.exe 4372 reg.exe 808 reg.exe 2028 reg.exe 1732 reg.exe 64 reg.exe 3652 Process not Found 2824 reg.exe 4720 reg.exe 3968 reg.exe 2352 reg.exe 1872 reg.exe 2400 reg.exe 1812 reg.exe 2672 reg.exe 208 reg.exe 1892 reg.exe 3056 reg.exe 4076 reg.exe 4776 reg.exe 4764 Process not Found 2624 reg.exe 4976 reg.exe 4776 reg.exe 1740 reg.exe 2352 reg.exe 4500 reg.exe 2776 reg.exe 228 reg.exe 2352 reg.exe 5024 reg.exe 2688 reg.exe 3400 reg.exe 3268 reg.exe 3204 reg.exe 3380 reg.exe 4304 reg.exe 1484 Process not Found 2912 reg.exe 2668 reg.exe 5112 reg.exe 4516 reg.exe 3268 reg.exe 1740 reg.exe 3900 reg.exe 5112 reg.exe 3036 reg.exe 4940 reg.exe 3372 reg.exe 1884 reg.exe 3536 reg.exe 2968 reg.exe 1296 reg.exe 1792 Process not Found 644 reg.exe 2576 reg.exe 3644 reg.exe 692 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3652 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3652 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3652 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3652 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4352 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4352 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4352 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4352 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3552 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3552 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3552 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3552 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4556 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4556 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4556 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 4556 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3224 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3224 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3224 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3224 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2452 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2452 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2452 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2452 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3196 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3196 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3196 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3196 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3364 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3364 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3364 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3364 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 544 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 544 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 544 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 544 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3488 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3488 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3488 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 3488 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2752 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2752 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2752 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2752 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2920 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2920 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2920 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 2920 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 1880 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 1880 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 1880 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 1880 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 mIcAkccY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe 3012 mIcAkccY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3012 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 89 PID 5060 wrote to memory of 3012 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 89 PID 5060 wrote to memory of 3012 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 89 PID 5060 wrote to memory of 244 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 90 PID 5060 wrote to memory of 244 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 90 PID 5060 wrote to memory of 244 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 90 PID 5060 wrote to memory of 5052 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 91 PID 5060 wrote to memory of 5052 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 91 PID 5060 wrote to memory of 5052 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 91 PID 5060 wrote to memory of 1744 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 93 PID 5060 wrote to memory of 1744 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 93 PID 5060 wrote to memory of 1744 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 93 PID 5060 wrote to memory of 4792 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 94 PID 5060 wrote to memory of 4792 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 94 PID 5060 wrote to memory of 4792 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 94 PID 5060 wrote to memory of 4820 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 95 PID 5060 wrote to memory of 4820 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 95 PID 5060 wrote to memory of 4820 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 95 PID 5060 wrote to memory of 2940 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 96 PID 5060 wrote to memory of 2940 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 96 PID 5060 wrote to memory of 2940 5060 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 96 PID 5052 wrote to memory of 2724 5052 cmd.exe 97 PID 5052 wrote to memory of 2724 5052 cmd.exe 97 PID 5052 wrote to memory of 2724 5052 cmd.exe 97 PID 2940 wrote to memory of 4912 2940 cmd.exe 102 PID 2940 wrote to memory of 4912 2940 cmd.exe 102 PID 2940 wrote to memory of 4912 2940 cmd.exe 102 PID 2724 wrote to memory of 2624 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 103 PID 2724 wrote to memory of 2624 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 103 PID 2724 wrote to memory of 2624 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 103 PID 2724 wrote to memory of 764 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 105 PID 2724 wrote to memory of 764 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 105 PID 2724 wrote to memory of 764 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 105 PID 2724 wrote to memory of 3644 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 106 PID 2724 wrote to memory of 3644 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 106 PID 2724 wrote to memory of 3644 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 106 PID 2724 wrote to memory of 2828 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 107 PID 2724 wrote to memory of 2828 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 107 PID 2724 wrote to memory of 2828 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 107 PID 2724 wrote to memory of 216 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 108 PID 2724 wrote to memory of 216 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 108 PID 2724 wrote to memory of 216 2724 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 108 PID 2624 wrote to memory of 4516 2624 cmd.exe 113 PID 2624 wrote to memory of 4516 2624 cmd.exe 113 PID 2624 wrote to memory of 4516 2624 cmd.exe 113 PID 216 wrote to memory of 4744 216 cmd.exe 114 PID 216 wrote to memory of 4744 216 cmd.exe 114 PID 216 wrote to memory of 4744 216 cmd.exe 114 PID 4516 wrote to memory of 1864 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 115 PID 4516 wrote to memory of 1864 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 115 PID 4516 wrote to memory of 1864 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 115 PID 4516 wrote to memory of 2068 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 117 PID 4516 wrote to memory of 2068 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 117 PID 4516 wrote to memory of 2068 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 117 PID 4516 wrote to memory of 2352 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 118 PID 4516 wrote to memory of 2352 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 118 PID 4516 wrote to memory of 2352 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 118 PID 4516 wrote to memory of 4328 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 119 PID 4516 wrote to memory of 4328 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 119 PID 4516 wrote to memory of 4328 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 119 PID 4516 wrote to memory of 4928 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 176 PID 4516 wrote to memory of 4928 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 176 PID 4516 wrote to memory of 4928 4516 2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe 176 PID 1864 wrote to memory of 3652 1864 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\IuQcEkQs\mIcAkccY.exe"C:\Users\Admin\IuQcEkQs\mIcAkccY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3012
-
-
C:\ProgramData\SQEsMsMk\JIcsYgAg.exe"C:\ProgramData\SQEsMsMk\JIcsYgAg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:244
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"8⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"10⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"12⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"14⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"16⤵PID:3996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:4928
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"18⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"20⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"22⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"24⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"26⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"28⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"30⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"32⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock33⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"34⤵PID:4212
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock35⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"36⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock37⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"38⤵PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock39⤵PID:4056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"40⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock41⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"42⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock43⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"44⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock45⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"46⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock47⤵PID:688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"48⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock49⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"50⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock51⤵PID:2912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"52⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock53⤵PID:2028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"54⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock55⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"56⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock57⤵PID:808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"58⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock59⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"60⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock61⤵PID:1884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"62⤵PID:2452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock63⤵PID:1324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"64⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock65⤵PID:2912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"66⤵PID:4556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:264
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock67⤵PID:1528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"68⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock69⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"70⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock71⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"72⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock73⤵PID:948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"74⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock75⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"76⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock77⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"78⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock79⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"80⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock81⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"82⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock83⤵PID:2676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"84⤵
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock85⤵PID:848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"86⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock87⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"88⤵PID:4868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock89⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"90⤵PID:4052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock91⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"92⤵PID:2500
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock93⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"94⤵PID:4904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock95⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"96⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock97⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"98⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock99⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"100⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock101⤵
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"102⤵PID:2300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock103⤵PID:4352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"104⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock105⤵PID:2484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"106⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock107⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"108⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock109⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"110⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock111⤵PID:2944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"112⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock113⤵PID:2916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"114⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock115⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"116⤵
- System Location Discovery: System Language Discovery
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock117⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"118⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock119⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"120⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock121⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_c2f2ce5f0660afce6129275ef6e8d5aa_virlock"122⤵PID:1032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-