Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe
-
Size
207KB
-
MD5
a15a2fb906ba42425a98b98c94e4f4ad
-
SHA1
ef86c496d4fbfa8cdb9a522826cdb14b1b4c420d
-
SHA256
856b4970b7c9f02b05f3d0851aa19607ac9f3a20c3cd00602c27a90db7cf7403
-
SHA512
4b061be8e56c8864fb245a12c4ebedea2156854dc197b5452e0725fa2abf1f61ef5cae5abe568ebe45ea8af6429daf312dbf7e87231fd67d7ee2033e3faadef3
-
SSDEEP
6144:fbZ7dlHxWinSO54nNQlfC0QqRWQCqeXhn3X7c7XPbzwc9ZJu:TlHP540fbzfZJu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation zwMYcMYc.exe -
Executes dropped EXE 2 IoCs
pid Process 1632 MQUEEMUw.exe 1760 zwMYcMYc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MQUEEMUw.exe = "C:\\Users\\Admin\\ZsQcYkws\\MQUEEMUw.exe" 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zwMYcMYc.exe = "C:\\ProgramData\\zGIQkQQA\\zwMYcMYc.exe" 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zwMYcMYc.exe = "C:\\ProgramData\\zGIQkQQA\\zwMYcMYc.exe" zwMYcMYc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MQUEEMUw.exe = "C:\\Users\\Admin\\ZsQcYkws\\MQUEEMUw.exe" MQUEEMUw.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe zwMYcMYc.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe zwMYcMYc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1752 reg.exe 3808 reg.exe 4684 reg.exe 2000 reg.exe 4500 reg.exe 3764 reg.exe 1240 reg.exe 3704 reg.exe 2004 reg.exe 4652 reg.exe 5052 reg.exe 1492 reg.exe 2448 reg.exe 3536 reg.exe 1636 reg.exe 4408 reg.exe 3988 reg.exe 404 reg.exe 4804 reg.exe 2076 reg.exe 4780 reg.exe 4864 reg.exe 1764 reg.exe 2384 reg.exe 4340 reg.exe 2432 reg.exe 832 reg.exe 4788 reg.exe 1020 reg.exe 1508 reg.exe 228 reg.exe 3260 reg.exe 3552 reg.exe 2876 reg.exe 4572 reg.exe 4572 reg.exe 2312 reg.exe 724 reg.exe 4376 reg.exe 4520 reg.exe 2312 reg.exe 2548 reg.exe 4760 reg.exe 4892 reg.exe 3816 reg.exe 2248 reg.exe 3012 reg.exe 3384 reg.exe 3400 reg.exe 3564 reg.exe 4808 reg.exe 4420 reg.exe 404 reg.exe 4196 reg.exe 2232 reg.exe 2196 reg.exe 1860 reg.exe 2392 reg.exe 2716 reg.exe 3536 reg.exe 3288 reg.exe 4288 reg.exe 1832 reg.exe 2676 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4576 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4576 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4576 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4576 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1752 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1752 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1752 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1752 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3616 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3616 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3616 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3616 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4324 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4324 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4324 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4324 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2980 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2980 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2980 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2980 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3236 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3236 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3236 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3236 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3596 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3596 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3596 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3596 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1168 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1168 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1168 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 1168 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4372 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4372 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4372 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4372 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4820 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4820 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4820 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4820 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4788 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4788 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4788 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 4788 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2276 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2276 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2276 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 2276 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3496 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3496 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3496 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 3496 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1760 zwMYcMYc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe 1760 zwMYcMYc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1632 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 82 PID 4588 wrote to memory of 1632 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 82 PID 4588 wrote to memory of 1632 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 82 PID 4588 wrote to memory of 1760 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 83 PID 4588 wrote to memory of 1760 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 83 PID 4588 wrote to memory of 1760 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 83 PID 4588 wrote to memory of 436 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 84 PID 4588 wrote to memory of 436 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 84 PID 4588 wrote to memory of 436 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 84 PID 436 wrote to memory of 448 436 cmd.exe 86 PID 436 wrote to memory of 448 436 cmd.exe 86 PID 436 wrote to memory of 448 436 cmd.exe 86 PID 4588 wrote to memory of 4572 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 87 PID 4588 wrote to memory of 4572 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 87 PID 4588 wrote to memory of 4572 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 87 PID 4588 wrote to memory of 404 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 88 PID 4588 wrote to memory of 404 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 88 PID 4588 wrote to memory of 404 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 88 PID 4588 wrote to memory of 832 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 89 PID 4588 wrote to memory of 832 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 89 PID 4588 wrote to memory of 832 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 89 PID 4588 wrote to memory of 3300 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 90 PID 4588 wrote to memory of 3300 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 90 PID 4588 wrote to memory of 3300 4588 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 90 PID 3300 wrote to memory of 1512 3300 cmd.exe 95 PID 3300 wrote to memory of 1512 3300 cmd.exe 95 PID 3300 wrote to memory of 1512 3300 cmd.exe 95 PID 448 wrote to memory of 2036 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 96 PID 448 wrote to memory of 2036 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 96 PID 448 wrote to memory of 2036 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 96 PID 2036 wrote to memory of 1572 2036 cmd.exe 98 PID 2036 wrote to memory of 1572 2036 cmd.exe 98 PID 2036 wrote to memory of 1572 2036 cmd.exe 98 PID 448 wrote to memory of 4904 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 99 PID 448 wrote to memory of 4904 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 99 PID 448 wrote to memory of 4904 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 99 PID 448 wrote to memory of 4436 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 100 PID 448 wrote to memory of 4436 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 100 PID 448 wrote to memory of 4436 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 100 PID 448 wrote to memory of 1340 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 101 PID 448 wrote to memory of 1340 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 101 PID 448 wrote to memory of 1340 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 101 PID 448 wrote to memory of 3508 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 103 PID 448 wrote to memory of 3508 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 103 PID 448 wrote to memory of 3508 448 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 103 PID 3508 wrote to memory of 680 3508 cmd.exe 107 PID 3508 wrote to memory of 680 3508 cmd.exe 107 PID 3508 wrote to memory of 680 3508 cmd.exe 107 PID 1572 wrote to memory of 872 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 108 PID 1572 wrote to memory of 872 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 108 PID 1572 wrote to memory of 872 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 108 PID 872 wrote to memory of 4576 872 cmd.exe 110 PID 872 wrote to memory of 4576 872 cmd.exe 110 PID 872 wrote to memory of 4576 872 cmd.exe 110 PID 1572 wrote to memory of 4340 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 111 PID 1572 wrote to memory of 4340 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 111 PID 1572 wrote to memory of 4340 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 111 PID 1572 wrote to memory of 4700 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 112 PID 1572 wrote to memory of 4700 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 112 PID 1572 wrote to memory of 4700 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 112 PID 1572 wrote to memory of 4248 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 113 PID 1572 wrote to memory of 4248 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 113 PID 1572 wrote to memory of 4248 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 113 PID 1572 wrote to memory of 968 1572 20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe"C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\ZsQcYkws\MQUEEMUw.exe"C:\Users\Admin\ZsQcYkws\MQUEEMUw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1632
-
-
C:\ProgramData\zGIQkQQA\zwMYcMYc.exe"C:\ProgramData\zGIQkQQA\zwMYcMYc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1760
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"2⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"6⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"8⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"10⤵
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"12⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"14⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"16⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"18⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"20⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"22⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"24⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"26⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"28⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"30⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"32⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock33⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"34⤵
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock35⤵
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"36⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock37⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"38⤵
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock39⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"40⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock41⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"42⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock43⤵PID:812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"44⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock45⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"46⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock47⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"48⤵
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock49⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"50⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock51⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"52⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock53⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"54⤵PID:3384
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock55⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"56⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock57⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"58⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock59⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"60⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock61⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"62⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock63⤵
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"64⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock65⤵PID:1440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"66⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock67⤵
- System Location Discovery: System Language Discovery
PID:3256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"68⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock69⤵PID:1220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"70⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock71⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"72⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock73⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"74⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock75⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"76⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock77⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"78⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock79⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"80⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock81⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"82⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock83⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"84⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock85⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"86⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock87⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"88⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock89⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"90⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock91⤵PID:3396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"92⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock93⤵PID:3400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"94⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock95⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"96⤵PID:724
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock97⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"98⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock99⤵PID:1276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"100⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock101⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"102⤵
- System Location Discovery: System Language Discovery
PID:396 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock103⤵PID:1740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"104⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock105⤵PID:3300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"106⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock107⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"108⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock109⤵PID:2532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"110⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock111⤵PID:4764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"112⤵
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock113⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"114⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock115⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"116⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock117⤵PID:424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"118⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock119⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"120⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock.exeC:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock121⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920a15a2fb906ba42425a98b98c94e4f4advirlock"122⤵PID:2160
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-