Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe
Resource
win10v2004-20240802-en
General
-
Target
202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe
-
Size
188KB
-
MD5
7dd592ebe4f3611ab93c1899b4c843aa
-
SHA1
936bf145545be8fe5f771b2fc725e5da0300f23c
-
SHA256
657ce51795124eab3cb86c4a2668cbcb60529c505109e139aba577449189b2bd
-
SHA512
3a76bc98ccbda115241723a43425cd68d05cd405636981a35dd028dd2edb4671f4d6b7d224daa7807fcb8aa73319075864d41490132ec4d5e105ec7268e4f696
-
SSDEEP
3072:b/MwLW/+k9e5kmQqtyBqNeaAo0gkG5g0l9txamlIazQsXIHuw:b/FrOji04ng0e4JzQsVw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation yaYgoQcA.exe -
Executes dropped EXE 2 IoCs
pid Process 1828 hcgsUIkw.exe 1776 yaYgoQcA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hcgsUIkw.exe = "C:\\Users\\Admin\\HaEgUIoo\\hcgsUIkw.exe" 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yaYgoQcA.exe = "C:\\ProgramData\\pWoAIEkU\\yaYgoQcA.exe" 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\yaYgoQcA.exe = "C:\\ProgramData\\pWoAIEkU\\yaYgoQcA.exe" yaYgoQcA.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hcgsUIkw.exe = "C:\\Users\\Admin\\HaEgUIoo\\hcgsUIkw.exe" hcgsUIkw.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe yaYgoQcA.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe yaYgoQcA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 448 reg.exe 3076 reg.exe 3032 reg.exe 3032 reg.exe 4152 reg.exe 4364 reg.exe 5044 reg.exe 684 reg.exe 2424 reg.exe 2036 Process not Found 808 reg.exe 1644 reg.exe 392 reg.exe 4840 reg.exe 3276 reg.exe 1780 reg.exe 3232 reg.exe 4820 reg.exe 852 reg.exe 1756 reg.exe 2172 Process not Found 1600 reg.exe 3516 reg.exe 3228 reg.exe 628 reg.exe 232 reg.exe 2580 reg.exe 1452 Process not Found 4440 reg.exe 3940 reg.exe 4688 reg.exe 1492 reg.exe 5068 reg.exe 2888 reg.exe 3816 reg.exe 1008 reg.exe 1252 reg.exe 368 Process not Found 2412 reg.exe 1844 Process not Found 1712 reg.exe 2828 reg.exe 5096 reg.exe 3724 reg.exe 1332 reg.exe 2336 reg.exe 4360 reg.exe 2044 reg.exe 4828 reg.exe 3692 reg.exe 864 reg.exe 3816 reg.exe 880 reg.exe 4248 reg.exe 232 reg.exe 4788 reg.exe 4472 reg.exe 4540 reg.exe 1936 Process not Found 3956 reg.exe 1680 reg.exe 4924 reg.exe 4576 Process not Found 3332 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1624 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1624 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1624 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1624 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2032 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2032 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2032 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2032 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3060 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3060 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3060 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3060 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4412 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4412 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4412 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4412 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1008 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1008 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1008 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 1008 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 444 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 444 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 444 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 444 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 5076 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 5076 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 5076 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 5076 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4944 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4944 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4944 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4944 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3584 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3584 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3584 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 3584 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4968 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4968 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4968 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4968 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4568 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4568 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4568 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 4568 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 808 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 808 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 808 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 808 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2908 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2908 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2908 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 2908 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1776 yaYgoQcA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe 1776 yaYgoQcA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 1828 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 82 PID 1000 wrote to memory of 1828 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 82 PID 1000 wrote to memory of 1828 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 82 PID 1000 wrote to memory of 1776 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 83 PID 1000 wrote to memory of 1776 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 83 PID 1000 wrote to memory of 1776 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 83 PID 1000 wrote to memory of 3596 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 84 PID 1000 wrote to memory of 3596 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 84 PID 1000 wrote to memory of 3596 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 84 PID 1000 wrote to memory of 4492 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 85 PID 1000 wrote to memory of 4492 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 85 PID 1000 wrote to memory of 4492 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 85 PID 1000 wrote to memory of 3656 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 87 PID 1000 wrote to memory of 3656 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 87 PID 1000 wrote to memory of 3656 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 87 PID 1000 wrote to memory of 3296 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 88 PID 1000 wrote to memory of 3296 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 88 PID 1000 wrote to memory of 3296 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 88 PID 1000 wrote to memory of 2196 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 89 PID 1000 wrote to memory of 2196 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 89 PID 1000 wrote to memory of 2196 1000 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 89 PID 3596 wrote to memory of 3964 3596 cmd.exe 94 PID 3596 wrote to memory of 3964 3596 cmd.exe 94 PID 3596 wrote to memory of 3964 3596 cmd.exe 94 PID 2196 wrote to memory of 4864 2196 cmd.exe 95 PID 2196 wrote to memory of 4864 2196 cmd.exe 95 PID 2196 wrote to memory of 4864 2196 cmd.exe 95 PID 3964 wrote to memory of 4060 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 96 PID 3964 wrote to memory of 4060 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 96 PID 3964 wrote to memory of 4060 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 96 PID 4060 wrote to memory of 1592 4060 cmd.exe 98 PID 4060 wrote to memory of 1592 4060 cmd.exe 98 PID 4060 wrote to memory of 1592 4060 cmd.exe 98 PID 3964 wrote to memory of 4828 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 99 PID 3964 wrote to memory of 4828 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 99 PID 3964 wrote to memory of 4828 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 99 PID 3964 wrote to memory of 1124 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 100 PID 3964 wrote to memory of 1124 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 100 PID 3964 wrote to memory of 1124 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 100 PID 3964 wrote to memory of 1668 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 101 PID 3964 wrote to memory of 1668 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 101 PID 3964 wrote to memory of 1668 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 101 PID 3964 wrote to memory of 4936 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 102 PID 3964 wrote to memory of 4936 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 102 PID 3964 wrote to memory of 4936 3964 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 102 PID 4936 wrote to memory of 2072 4936 cmd.exe 107 PID 4936 wrote to memory of 2072 4936 cmd.exe 107 PID 4936 wrote to memory of 2072 4936 cmd.exe 107 PID 1592 wrote to memory of 5064 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 108 PID 1592 wrote to memory of 5064 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 108 PID 1592 wrote to memory of 5064 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 108 PID 1592 wrote to memory of 4596 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 110 PID 1592 wrote to memory of 4596 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 110 PID 1592 wrote to memory of 4596 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 110 PID 1592 wrote to memory of 4524 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 111 PID 1592 wrote to memory of 4524 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 111 PID 1592 wrote to memory of 4524 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 111 PID 1592 wrote to memory of 512 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 112 PID 1592 wrote to memory of 512 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 112 PID 1592 wrote to memory of 512 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 112 PID 1592 wrote to memory of 1272 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 113 PID 1592 wrote to memory of 1272 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 113 PID 1592 wrote to memory of 1272 1592 202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe 113 PID 5064 wrote to memory of 1624 5064 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe"C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\HaEgUIoo\hcgsUIkw.exe"C:\Users\Admin\HaEgUIoo\hcgsUIkw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1828
-
-
C:\ProgramData\pWoAIEkU\yaYgoQcA.exe"C:\ProgramData\pWoAIEkU\yaYgoQcA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1776
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"6⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"8⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"10⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"12⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"14⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"16⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"18⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"20⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"22⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"24⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"26⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"28⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"30⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"32⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock33⤵PID:3236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"34⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock35⤵PID:912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"36⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock37⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"38⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock39⤵PID:3108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"40⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock41⤵PID:2036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"42⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock43⤵PID:3896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"44⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock45⤵PID:1116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"46⤵
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock47⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"48⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock49⤵PID:1664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"50⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock51⤵PID:4104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"52⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock53⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"54⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock55⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"56⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock57⤵PID:1240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"58⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock59⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"60⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock61⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"62⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock63⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"64⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock65⤵PID:2680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"66⤵PID:5064
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock67⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"68⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock69⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"70⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock71⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"72⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock73⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"74⤵
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock75⤵
- System Location Discovery: System Language Discovery
PID:1244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"76⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock77⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"78⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock79⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"80⤵PID:1596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:3732
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock81⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"82⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock83⤵PID:1316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"84⤵PID:876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock85⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"86⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock87⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"88⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock89⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"90⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock91⤵PID:2108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"92⤵PID:5104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:3584
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock93⤵PID:1492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"94⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock95⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"96⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock97⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"98⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock99⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"100⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock101⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"102⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock103⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"104⤵PID:4080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock105⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"106⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock107⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"108⤵PID:4640
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock109⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"110⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock111⤵PID:232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"112⤵PID:4164
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock113⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"114⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock115⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"116⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock117⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"118⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock119⤵PID:2172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"120⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock.exeC:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock121⤵PID:3456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202409207dd592ebe4f3611ab93c1899b4c843aavirlock"122⤵
- System Location Discovery: System Language Discovery
PID:2672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-