Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:27
Static task
static1
Behavioral task
behavioral1
Sample
2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe
Resource
win7-20240903-en
General
-
Target
2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe
-
Size
326KB
-
MD5
80e72317721dd6d5a50e52da6cc2113c
-
SHA1
3426df0c5e67a4cdb8973ade4d8530000808c49a
-
SHA256
892c81979c510816baac1fb06806dfbb310976b7258d591e7a5c9ef5c730b4ef
-
SHA512
c139f38d2ab2fba7a9757c9e2eaf5c25fc17a0484a7b4a36962dd5ad8d9fbc43c3a1a302572aefe1674e05e60f01633dab249317732b8e99fac47ec4fe4368e1
-
SSDEEP
6144:zxcBFEGDfWhgerC8eenWJB129tOoxhVqFg+vEEzBiJDySBfa4K+N3z3obq2:zyEod6BoJB1I/4PETDyLR+N3zY+2
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (58) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo\Nation YScsIEQY.exe -
Deletes itself 1 IoCs
pid Process 1644 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2740 YScsIEQY.exe 2744 cyYEcwMQ.exe -
Loads dropped DLL 20 IoCs
pid Process 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\YScsIEQY.exe = "C:\\Users\\Admin\\gMUMgIgw\\YScsIEQY.exe" 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cyYEcwMQ.exe = "C:\\ProgramData\\oYQkoskE\\cyYEcwMQ.exe" 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\YScsIEQY.exe = "C:\\Users\\Admin\\gMUMgIgw\\YScsIEQY.exe" YScsIEQY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cyYEcwMQ.exe = "C:\\ProgramData\\oYQkoskE\\cyYEcwMQ.exe" cyYEcwMQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3052 reg.exe 1708 reg.exe 2756 reg.exe 2688 reg.exe 760 reg.exe 2364 reg.exe 2964 reg.exe 2324 reg.exe 2056 reg.exe 2772 reg.exe 2016 reg.exe 1544 reg.exe 112 reg.exe 2848 reg.exe 2552 reg.exe 1720 reg.exe 2380 reg.exe 1940 reg.exe 1868 reg.exe 1904 reg.exe 836 reg.exe 108 reg.exe 2912 reg.exe 816 reg.exe 2944 reg.exe 988 reg.exe 600 reg.exe 1648 reg.exe 844 reg.exe 2704 reg.exe 2620 reg.exe 2216 reg.exe 1272 reg.exe 1860 reg.exe 1212 reg.exe 2860 reg.exe 2736 reg.exe 2852 reg.exe 2612 reg.exe 1004 reg.exe 1088 reg.exe 1620 reg.exe 2696 reg.exe 2608 reg.exe 836 reg.exe 2132 reg.exe 2196 reg.exe 1412 reg.exe 1440 reg.exe 2556 reg.exe 396 reg.exe 2904 reg.exe 2292 reg.exe 2292 reg.exe 1980 reg.exe 2540 reg.exe 2736 reg.exe 2536 reg.exe 860 reg.exe 964 reg.exe 2488 reg.exe 2796 reg.exe 696 reg.exe 2340 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1764 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1764 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 108 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 108 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2880 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2880 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2288 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2288 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1372 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1372 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1596 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1596 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 832 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 832 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1440 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1440 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2848 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2848 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2332 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2332 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 780 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 780 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2732 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2732 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2676 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2676 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3008 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2896 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2896 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1244 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1244 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2828 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2828 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1924 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1924 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 448 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 448 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3068 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3068 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3052 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 3052 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2640 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2640 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1196 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1196 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2536 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2536 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1584 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1584 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2864 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2864 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2664 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 2664 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1876 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 1876 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2740 YScsIEQY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe 2740 YScsIEQY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2740 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 30 PID 2316 wrote to memory of 2740 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 30 PID 2316 wrote to memory of 2740 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 30 PID 2316 wrote to memory of 2740 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 30 PID 2316 wrote to memory of 2744 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 31 PID 2316 wrote to memory of 2744 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 31 PID 2316 wrote to memory of 2744 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 31 PID 2316 wrote to memory of 2744 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 31 PID 2316 wrote to memory of 2708 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 32 PID 2316 wrote to memory of 2708 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 32 PID 2316 wrote to memory of 2708 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 32 PID 2316 wrote to memory of 2708 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 32 PID 2316 wrote to memory of 1904 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 34 PID 2316 wrote to memory of 1904 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 34 PID 2316 wrote to memory of 1904 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 34 PID 2316 wrote to memory of 1904 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 34 PID 2316 wrote to memory of 2764 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 35 PID 2316 wrote to memory of 2764 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 35 PID 2316 wrote to memory of 2764 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 35 PID 2316 wrote to memory of 2764 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 35 PID 2316 wrote to memory of 2756 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 36 PID 2316 wrote to memory of 2756 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 36 PID 2316 wrote to memory of 2756 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 36 PID 2316 wrote to memory of 2756 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 36 PID 2316 wrote to memory of 2620 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 38 PID 2316 wrote to memory of 2620 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 38 PID 2316 wrote to memory of 2620 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 38 PID 2316 wrote to memory of 2620 2316 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 38 PID 2708 wrote to memory of 2176 2708 cmd.exe 42 PID 2708 wrote to memory of 2176 2708 cmd.exe 42 PID 2708 wrote to memory of 2176 2708 cmd.exe 42 PID 2708 wrote to memory of 2176 2708 cmd.exe 42 PID 2620 wrote to memory of 2824 2620 cmd.exe 43 PID 2620 wrote to memory of 2824 2620 cmd.exe 43 PID 2620 wrote to memory of 2824 2620 cmd.exe 43 PID 2620 wrote to memory of 2824 2620 cmd.exe 43 PID 2176 wrote to memory of 2128 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 44 PID 2176 wrote to memory of 2128 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 44 PID 2176 wrote to memory of 2128 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 44 PID 2176 wrote to memory of 2128 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 44 PID 2128 wrote to memory of 1764 2128 cmd.exe 46 PID 2128 wrote to memory of 1764 2128 cmd.exe 46 PID 2128 wrote to memory of 1764 2128 cmd.exe 46 PID 2128 wrote to memory of 1764 2128 cmd.exe 46 PID 2176 wrote to memory of 1372 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 47 PID 2176 wrote to memory of 1372 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 47 PID 2176 wrote to memory of 1372 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 47 PID 2176 wrote to memory of 1372 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 47 PID 2176 wrote to memory of 1908 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 48 PID 2176 wrote to memory of 1908 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 48 PID 2176 wrote to memory of 1908 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 48 PID 2176 wrote to memory of 1908 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 48 PID 2176 wrote to memory of 1464 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 50 PID 2176 wrote to memory of 1464 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 50 PID 2176 wrote to memory of 1464 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 50 PID 2176 wrote to memory of 1464 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 50 PID 2176 wrote to memory of 2328 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 52 PID 2176 wrote to memory of 2328 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 52 PID 2176 wrote to memory of 2328 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 52 PID 2176 wrote to memory of 2328 2176 2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe 52 PID 2328 wrote to memory of 2812 2328 cmd.exe 55 PID 2328 wrote to memory of 2812 2328 cmd.exe 55 PID 2328 wrote to memory of 2812 2328 cmd.exe 55 PID 2328 wrote to memory of 2812 2328 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe"C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\gMUMgIgw\YScsIEQY.exe"C:\Users\Admin\gMUMgIgw\YScsIEQY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2740
-
-
C:\ProgramData\oYQkoskE\cyYEcwMQ.exe"C:\ProgramData\oYQkoskE\cyYEcwMQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2744
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"6⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"8⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"10⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"12⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"14⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"16⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"18⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"20⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"22⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"24⤵
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"26⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"28⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"30⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"32⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"34⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"36⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"38⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"40⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock41⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"42⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"44⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"46⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock47⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"48⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"50⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"52⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"54⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"56⤵
- System Location Discovery: System Language Discovery
PID:636 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"58⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"60⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"62⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"64⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock65⤵PID:112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"66⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock67⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"68⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock69⤵PID:2956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"70⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock71⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"72⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock73⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"74⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock75⤵PID:1052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"76⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock77⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"78⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock79⤵PID:108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"80⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock81⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"82⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock83⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"84⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock85⤵PID:960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"86⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock87⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"88⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock89⤵PID:1280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"90⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock91⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"92⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock93⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"94⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock95⤵PID:1288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"96⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock97⤵PID:1328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"98⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock99⤵PID:2620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"100⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock101⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"102⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock103⤵PID:2496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"104⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock105⤵PID:560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"106⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock107⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"108⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock109⤵PID:2140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"110⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock111⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"112⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock113⤵PID:2460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"114⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock115⤵PID:1848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"116⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock117⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"118⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock119⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"120⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock.exeC:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock121⤵PID:2712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024092080e72317721dd6d5a50e52da6cc2113cvirlock"122⤵PID:1860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-