Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
-
Size
208KB
-
MD5
006fbb7a7a5386fe5629f895d8969b45
-
SHA1
0241c9d8234e6b31d51f70a9df97dfa700a73229
-
SHA256
7f89c34f98ce21ea18234c4e5c0fb83274cd63519b630d553bb6751b0b6fe4e2
-
SHA512
995542437cca9f18a56a9a51fa69a01da784d7d8be277ab2e6be83fd2d162ab3761992aaaacb93e337de4a70aabbcee0e4068dd5632cf98b9534fd836340cb84
-
SSDEEP
3072:FRyqCshdxLZhd91BNskwIBnvy8VLKYl0XMKvWWFDTJOQd2xfPmS:HFHfdbsJIBnhVLKYlQRFDt5d4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\International\Geo\Nation FOgMAUko.exe -
Deletes itself 1 IoCs
pid Process 2444 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2176 FOgMAUko.exe 2648 WcgswAcU.exe -
Loads dropped DLL 20 IoCs
pid Process 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\FOgMAUko.exe = "C:\\Users\\Admin\\LoosQAoY\\FOgMAUko.exe" FOgMAUko.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WcgswAcU.exe = "C:\\ProgramData\\tQsEoYYk\\WcgswAcU.exe" WcgswAcU.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\FOgMAUko.exe = "C:\\Users\\Admin\\LoosQAoY\\FOgMAUko.exe" 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WcgswAcU.exe = "C:\\ProgramData\\tQsEoYYk\\WcgswAcU.exe" 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico FOgMAUko.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1948 reg.exe 1376 reg.exe 2088 reg.exe 296 reg.exe 528 reg.exe 556 reg.exe 1144 reg.exe 2088 reg.exe 2232 reg.exe 1328 reg.exe 2856 reg.exe 1144 reg.exe 1728 reg.exe 1488 reg.exe 2420 reg.exe 564 reg.exe 396 reg.exe 1724 reg.exe 2184 reg.exe 2720 reg.exe 1148 reg.exe 1304 reg.exe 1552 reg.exe 1908 reg.exe 1032 reg.exe 2872 reg.exe 2296 reg.exe 2168 reg.exe 2856 reg.exe 2768 reg.exe 860 reg.exe 284 reg.exe 2912 reg.exe 2292 reg.exe 2684 reg.exe 1984 reg.exe 2276 reg.exe 1952 reg.exe 1916 reg.exe 480 reg.exe 2872 reg.exe 2384 reg.exe 3056 reg.exe 2672 reg.exe 1720 reg.exe 1880 reg.exe 2352 reg.exe 2332 reg.exe 3064 reg.exe 316 reg.exe 2864 reg.exe 2188 reg.exe 1780 reg.exe 2368 reg.exe 1460 reg.exe 2780 reg.exe 1952 reg.exe 2692 reg.exe 2068 reg.exe 2772 reg.exe 2252 reg.exe 1280 reg.exe 2840 reg.exe 1728 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1108 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1108 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2020 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2020 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 316 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 316 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1048 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1048 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2236 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2236 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3044 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3044 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2656 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2656 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2968 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2968 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1320 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1320 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2420 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2420 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2332 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2332 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2704 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2704 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2396 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2396 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2380 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2380 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1032 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1032 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1652 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1652 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2716 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2716 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2124 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2124 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 296 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 296 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1584 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1584 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1764 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1764 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2556 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2556 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2388 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2388 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 740 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 740 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1516 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1516 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 296 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 296 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2776 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2776 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2840 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2840 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2704 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2704 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2176 FOgMAUko.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe 2176 FOgMAUko.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2176 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 31 PID 2232 wrote to memory of 2176 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 31 PID 2232 wrote to memory of 2176 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 31 PID 2232 wrote to memory of 2176 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 31 PID 2232 wrote to memory of 2648 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 32 PID 2232 wrote to memory of 2648 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 32 PID 2232 wrote to memory of 2648 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 32 PID 2232 wrote to memory of 2648 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 32 PID 2232 wrote to memory of 2676 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 33 PID 2232 wrote to memory of 2676 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 33 PID 2232 wrote to memory of 2676 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 33 PID 2232 wrote to memory of 2676 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 33 PID 2676 wrote to memory of 2784 2676 cmd.exe 35 PID 2676 wrote to memory of 2784 2676 cmd.exe 35 PID 2676 wrote to memory of 2784 2676 cmd.exe 35 PID 2676 wrote to memory of 2784 2676 cmd.exe 35 PID 2232 wrote to memory of 2772 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 36 PID 2232 wrote to memory of 2772 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 36 PID 2232 wrote to memory of 2772 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 36 PID 2232 wrote to memory of 2772 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 36 PID 2232 wrote to memory of 2780 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 37 PID 2232 wrote to memory of 2780 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 37 PID 2232 wrote to memory of 2780 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 37 PID 2232 wrote to memory of 2780 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 37 PID 2232 wrote to memory of 2816 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 38 PID 2232 wrote to memory of 2816 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 38 PID 2232 wrote to memory of 2816 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 38 PID 2232 wrote to memory of 2816 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 38 PID 2232 wrote to memory of 2168 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 41 PID 2232 wrote to memory of 2168 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 41 PID 2232 wrote to memory of 2168 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 41 PID 2232 wrote to memory of 2168 2232 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 41 PID 2168 wrote to memory of 2944 2168 cmd.exe 44 PID 2168 wrote to memory of 2944 2168 cmd.exe 44 PID 2168 wrote to memory of 2944 2168 cmd.exe 44 PID 2168 wrote to memory of 2944 2168 cmd.exe 44 PID 2784 wrote to memory of 2392 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 45 PID 2784 wrote to memory of 2392 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 45 PID 2784 wrote to memory of 2392 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 45 PID 2784 wrote to memory of 2392 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 45 PID 2392 wrote to memory of 1108 2392 cmd.exe 47 PID 2392 wrote to memory of 1108 2392 cmd.exe 47 PID 2392 wrote to memory of 1108 2392 cmd.exe 47 PID 2392 wrote to memory of 1108 2392 cmd.exe 47 PID 2784 wrote to memory of 2952 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 48 PID 2784 wrote to memory of 2952 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 48 PID 2784 wrote to memory of 2952 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 48 PID 2784 wrote to memory of 2952 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 48 PID 2784 wrote to memory of 2628 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 49 PID 2784 wrote to memory of 2628 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 49 PID 2784 wrote to memory of 2628 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 49 PID 2784 wrote to memory of 2628 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 49 PID 2784 wrote to memory of 2960 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 51 PID 2784 wrote to memory of 2960 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 51 PID 2784 wrote to memory of 2960 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 51 PID 2784 wrote to memory of 2960 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 51 PID 2784 wrote to memory of 2856 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 52 PID 2784 wrote to memory of 2856 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 52 PID 2784 wrote to memory of 2856 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 52 PID 2784 wrote to memory of 2856 2784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 52 PID 2856 wrote to memory of 284 2856 cmd.exe 56 PID 2856 wrote to memory of 284 2856 cmd.exe 56 PID 2856 wrote to memory of 284 2856 cmd.exe 56 PID 2856 wrote to memory of 284 2856 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe"C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\LoosQAoY\FOgMAUko.exe"C:\Users\Admin\LoosQAoY\FOgMAUko.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2176
-
-
C:\ProgramData\tQsEoYYk\WcgswAcU.exe"C:\ProgramData\tQsEoYYk\WcgswAcU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2648
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"6⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"8⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"10⤵
- System Location Discovery: System Language Discovery
PID:280 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"12⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"14⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"16⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"18⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"20⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"22⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"24⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"26⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock27⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"28⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"30⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"32⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"34⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"36⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"38⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"40⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock41⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"42⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"44⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"46⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"48⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"50⤵
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"52⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"54⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"56⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"58⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"60⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"62⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"64⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock65⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"66⤵
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock67⤵PID:2380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"68⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock69⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"70⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock71⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"72⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock73⤵PID:796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"74⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock75⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"76⤵
- System Location Discovery: System Language Discovery
PID:888 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock77⤵PID:740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"78⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock79⤵PID:1892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"80⤵
- System Location Discovery: System Language Discovery
PID:676 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock81⤵PID:1216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"82⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock83⤵PID:972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"84⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock85⤵PID:1048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"86⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock87⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"88⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock89⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"90⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock91⤵PID:3064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"92⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock93⤵PID:3056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"94⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock95⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"96⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock97⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"98⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock99⤵PID:648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"100⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock101⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"102⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock103⤵
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"104⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock105⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"106⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock107⤵PID:2700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"108⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock109⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"110⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock111⤵PID:2904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"112⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock113⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"114⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock115⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"116⤵
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock117⤵PID:1948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"118⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock119⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"120⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock121⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"122⤵PID:1564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-