Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 11:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe
-
Size
204KB
-
MD5
3b885ddc27f542ab37b2396c624636bf
-
SHA1
3c572136ba01a9adf1645e0ec29503be85a4fabd
-
SHA256
dad6ab102599c5cb76607a39bc989acdb3f0caad236d54965845e1f52ba64227
-
SHA512
a5c1a367099769def5aaad14efb353616386bd85aca6dac684c33d3abbc29ace0cdc4914307a2464f3028c90a95e07d316235542470fb5eff345111b1bb6b5e2
-
SSDEEP
6144:PBCbU10CHdesprzuj8Vw7fNiu19xDkxdWrdc4cysWfp0ttPsYVoIBcNrLt/dzZ2X:T0Yrzumw7fNi09xDkxdWrdc4cspMPZA+
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\International\Geo\Nation BMwoUEsc.exe -
Deletes itself 1 IoCs
pid Process 2720 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2156 cKowcAQc.exe 2444 BMwoUEsc.exe -
Loads dropped DLL 20 IoCs
pid Process 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\GmUAwUEk.exe = "C:\\Users\\Admin\\wyEccUUs\\GmUAwUEk.exe" 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tKsQkgIg.exe = "C:\\ProgramData\\niMIAkwI\\tKsQkgIg.exe" 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\cKowcAQc.exe = "C:\\Users\\Admin\\EWcAkggE\\cKowcAQc.exe" 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BMwoUEsc.exe = "C:\\ProgramData\\SwcQUokc\\BMwoUEsc.exe" 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\BMwoUEsc.exe = "C:\\ProgramData\\SwcQUokc\\BMwoUEsc.exe" BMwoUEsc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\cKowcAQc.exe = "C:\\Users\\Admin\\EWcAkggE\\cKowcAQc.exe" cKowcAQc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2832 1928 WerFault.exe 1401 2004 3032 WerFault.exe 1402 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2344 reg.exe 1260 reg.exe 1300 reg.exe 1624 reg.exe 2360 reg.exe 2952 reg.exe 2100 reg.exe 1964 reg.exe 2640 reg.exe 1808 reg.exe 3012 reg.exe 1884 reg.exe 2064 reg.exe 2224 reg.exe 1776 reg.exe 532 reg.exe 796 reg.exe 3056 reg.exe 1880 reg.exe 1884 reg.exe 2080 reg.exe 2964 reg.exe 2344 reg.exe 2600 reg.exe 112 reg.exe 1552 reg.exe 2004 reg.exe 2420 reg.exe 792 reg.exe 2388 reg.exe 1932 reg.exe 1796 reg.exe 776 reg.exe 532 reg.exe 1496 reg.exe 2792 reg.exe 2584 reg.exe 2688 reg.exe 2920 reg.exe 568 reg.exe 2340 reg.exe 1132 reg.exe 1040 reg.exe 2772 reg.exe 1756 reg.exe 1948 reg.exe 1152 reg.exe 3028 reg.exe 960 reg.exe 1976 reg.exe 2900 reg.exe 2532 reg.exe 2596 reg.exe 2664 reg.exe 2920 reg.exe 1792 reg.exe 2704 reg.exe 2596 reg.exe 1596 reg.exe 1132 reg.exe 2028 reg.exe 2532 reg.exe 1300 reg.exe 2648 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2296 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2296 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 300 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 300 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 3012 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 3012 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1544 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1544 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2128 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2128 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2316 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2316 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1300 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1300 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2656 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2656 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 992 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 992 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2388 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2388 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1496 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1496 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 3044 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 3044 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 760 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 760 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2496 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2496 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1020 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1020 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2240 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2240 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2788 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2788 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 568 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 568 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1504 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1504 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 772 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 772 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2228 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2228 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 776 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 776 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2828 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2828 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1552 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 1552 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2232 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2232 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2288 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2288 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2092 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2092 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2196 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2196 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2284 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2284 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2328 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 2328 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2444 BMwoUEsc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe 2444 BMwoUEsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2156 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 30 PID 2364 wrote to memory of 2156 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 30 PID 2364 wrote to memory of 2156 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 30 PID 2364 wrote to memory of 2156 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 30 PID 2364 wrote to memory of 2444 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 31 PID 2364 wrote to memory of 2444 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 31 PID 2364 wrote to memory of 2444 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 31 PID 2364 wrote to memory of 2444 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 31 PID 2364 wrote to memory of 1876 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 32 PID 2364 wrote to memory of 1876 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 32 PID 2364 wrote to memory of 1876 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 32 PID 2364 wrote to memory of 1876 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 32 PID 2364 wrote to memory of 2688 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 33 PID 2364 wrote to memory of 2688 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 33 PID 2364 wrote to memory of 2688 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 33 PID 2364 wrote to memory of 2688 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 33 PID 2364 wrote to memory of 1628 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 34 PID 2364 wrote to memory of 1628 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 34 PID 2364 wrote to memory of 1628 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 34 PID 2364 wrote to memory of 1628 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 34 PID 2364 wrote to memory of 2316 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 35 PID 2364 wrote to memory of 2316 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 35 PID 2364 wrote to memory of 2316 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 35 PID 2364 wrote to memory of 2316 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 35 PID 2364 wrote to memory of 2744 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 36 PID 2364 wrote to memory of 2744 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 36 PID 2364 wrote to memory of 2744 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 36 PID 2364 wrote to memory of 2744 2364 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 36 PID 1876 wrote to memory of 2604 1876 cmd.exe 42 PID 1876 wrote to memory of 2604 1876 cmd.exe 42 PID 1876 wrote to memory of 2604 1876 cmd.exe 42 PID 1876 wrote to memory of 2604 1876 cmd.exe 42 PID 2744 wrote to memory of 2712 2744 cmd.exe 43 PID 2744 wrote to memory of 2712 2744 cmd.exe 43 PID 2744 wrote to memory of 2712 2744 cmd.exe 43 PID 2744 wrote to memory of 2712 2744 cmd.exe 43 PID 2604 wrote to memory of 3040 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 44 PID 2604 wrote to memory of 3040 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 44 PID 2604 wrote to memory of 3040 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 44 PID 2604 wrote to memory of 3040 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 44 PID 3040 wrote to memory of 2296 3040 cmd.exe 46 PID 3040 wrote to memory of 2296 3040 cmd.exe 46 PID 3040 wrote to memory of 2296 3040 cmd.exe 46 PID 3040 wrote to memory of 2296 3040 cmd.exe 46 PID 2604 wrote to memory of 1988 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 47 PID 2604 wrote to memory of 1988 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 47 PID 2604 wrote to memory of 1988 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 47 PID 2604 wrote to memory of 1988 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 47 PID 2604 wrote to memory of 1808 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 48 PID 2604 wrote to memory of 1808 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 48 PID 2604 wrote to memory of 1808 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 48 PID 2604 wrote to memory of 1808 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 48 PID 2604 wrote to memory of 1680 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 50 PID 2604 wrote to memory of 1680 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 50 PID 2604 wrote to memory of 1680 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 50 PID 2604 wrote to memory of 1680 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 50 PID 2604 wrote to memory of 1760 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 51 PID 2604 wrote to memory of 1760 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 51 PID 2604 wrote to memory of 1760 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 51 PID 2604 wrote to memory of 1760 2604 2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe 51 PID 1760 wrote to memory of 1728 1760 cmd.exe 55 PID 1760 wrote to memory of 1728 1760 cmd.exe 55 PID 1760 wrote to memory of 1728 1760 cmd.exe 55 PID 1760 wrote to memory of 1728 1760 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\EWcAkggE\cKowcAQc.exe"C:\Users\Admin\EWcAkggE\cKowcAQc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2156
-
-
C:\ProgramData\SwcQUokc\BMwoUEsc.exe"C:\ProgramData\SwcQUokc\BMwoUEsc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2444
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"6⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"8⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"10⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"12⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"14⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"16⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"18⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"20⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"22⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"24⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"26⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"28⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock29⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"30⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"32⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"34⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"36⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"38⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"40⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"42⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"44⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"46⤵
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"48⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"50⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"52⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"54⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"56⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"58⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"60⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"62⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"64⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock65⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"66⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock67⤵PID:2480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"68⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock69⤵PID:592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"70⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock71⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"72⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock73⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"74⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock75⤵PID:700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"76⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock77⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"78⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock79⤵PID:1992
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"80⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock81⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"82⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock83⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"84⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock85⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"86⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock87⤵PID:3064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"88⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock89⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"90⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock91⤵PID:1020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"92⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock93⤵PID:1876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"94⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock95⤵PID:2600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"96⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock97⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"98⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock99⤵PID:916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"100⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock101⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"102⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock103⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"104⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock105⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"106⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock107⤵PID:1080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"108⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock109⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"110⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock111⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"112⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock113⤵PID:2736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"114⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock115⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"116⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock117⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"118⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock119⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"120⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock121⤵PID:2704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-09-20_3b885ddc27f542ab37b2396c624636bf_virlock"122⤵PID:316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-