Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 18:17
Static task
static1
Behavioral task
behavioral1
Sample
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe
-
Size
208KB
-
MD5
006fbb7a7a5386fe5629f895d8969b45
-
SHA1
0241c9d8234e6b31d51f70a9df97dfa700a73229
-
SHA256
7f89c34f98ce21ea18234c4e5c0fb83274cd63519b630d553bb6751b0b6fe4e2
-
SHA512
995542437cca9f18a56a9a51fa69a01da784d7d8be277ab2e6be83fd2d162ab3761992aaaacb93e337de4a70aabbcee0e4068dd5632cf98b9534fd836340cb84
-
SSDEEP
3072:FRyqCshdxLZhd91BNskwIBnvy8VLKYl0XMKvWWFDTJOQd2xfPmS:HFHfdbsJIBnhVLKYlQRFDt5d4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation hCkUwgwQ.exe -
Executes dropped EXE 2 IoCs
pid Process 2888 hCkUwgwQ.exe 2016 MoAUAwgw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hCkUwgwQ.exe = "C:\\Users\\Admin\\OGUwssEA\\hCkUwgwQ.exe" 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MoAUAwgw.exe = "C:\\ProgramData\\RwsUQEsM\\MoAUAwgw.exe" 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hCkUwgwQ.exe = "C:\\Users\\Admin\\OGUwssEA\\hCkUwgwQ.exe" hCkUwgwQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MoAUAwgw.exe = "C:\\ProgramData\\RwsUQEsM\\MoAUAwgw.exe" MoAUAwgw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 4212 reg.exe 1172 reg.exe 2916 Process not Found 2952 reg.exe 3448 reg.exe 3600 reg.exe 1844 reg.exe 3132 reg.exe 4228 Process not Found 3752 reg.exe 468 reg.exe 2232 Process not Found 4800 Process not Found 4604 Process not Found 4932 reg.exe 3248 reg.exe 1000 reg.exe 1516 Process not Found 1632 reg.exe 60 reg.exe 1832 reg.exe 4496 reg.exe 3612 reg.exe 2952 reg.exe 5088 reg.exe 4468 reg.exe 532 reg.exe 4496 reg.exe 4968 reg.exe 3696 Process not Found 1900 reg.exe 4908 reg.exe 60 reg.exe 3772 reg.exe 932 reg.exe 1496 Process not Found 3548 reg.exe 2316 reg.exe 4672 reg.exe 4860 reg.exe 3748 reg.exe 3740 reg.exe 2768 reg.exe 1760 reg.exe 4236 reg.exe 3292 reg.exe 1760 reg.exe 4188 reg.exe 4176 reg.exe 5012 reg.exe 2700 reg.exe 2424 reg.exe 4416 reg.exe 2312 reg.exe 220 reg.exe 1724 reg.exe 3600 reg.exe 2772 reg.exe 3100 reg.exe 4084 reg.exe 2768 reg.exe 644 reg.exe 668 reg.exe 1168 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1116 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1116 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1116 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 1116 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2464 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2464 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2464 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2464 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2268 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2268 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2268 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2268 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3636 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3636 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3636 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3636 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 400 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 400 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 400 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 400 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4468 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4468 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4468 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4468 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3248 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3248 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3248 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3248 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 5028 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 5028 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 5028 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 5028 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4592 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4592 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4592 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4592 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2040 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2040 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2040 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 2040 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3748 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3748 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3748 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3748 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4148 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4148 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4148 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 4148 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 3784 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 hCkUwgwQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe 2888 hCkUwgwQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2888 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 89 PID 2080 wrote to memory of 2888 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 89 PID 2080 wrote to memory of 2888 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 89 PID 2080 wrote to memory of 2016 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 90 PID 2080 wrote to memory of 2016 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 90 PID 2080 wrote to memory of 2016 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 90 PID 2080 wrote to memory of 4968 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 91 PID 2080 wrote to memory of 4968 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 91 PID 2080 wrote to memory of 4968 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 91 PID 4968 wrote to memory of 4832 4968 cmd.exe 93 PID 4968 wrote to memory of 4832 4968 cmd.exe 93 PID 4968 wrote to memory of 4832 4968 cmd.exe 93 PID 2080 wrote to memory of 4932 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 94 PID 2080 wrote to memory of 4932 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 94 PID 2080 wrote to memory of 4932 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 94 PID 2080 wrote to memory of 2912 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 95 PID 2080 wrote to memory of 2912 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 95 PID 2080 wrote to memory of 2912 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 95 PID 2080 wrote to memory of 4120 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 96 PID 2080 wrote to memory of 4120 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 96 PID 2080 wrote to memory of 4120 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 96 PID 2080 wrote to memory of 752 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 97 PID 2080 wrote to memory of 752 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 97 PID 2080 wrote to memory of 752 2080 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 97 PID 752 wrote to memory of 2012 752 cmd.exe 102 PID 752 wrote to memory of 2012 752 cmd.exe 102 PID 752 wrote to memory of 2012 752 cmd.exe 102 PID 4832 wrote to memory of 1516 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 103 PID 4832 wrote to memory of 1516 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 103 PID 4832 wrote to memory of 1516 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 103 PID 1516 wrote to memory of 4732 1516 cmd.exe 105 PID 1516 wrote to memory of 4732 1516 cmd.exe 105 PID 1516 wrote to memory of 4732 1516 cmd.exe 105 PID 4832 wrote to memory of 1036 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 106 PID 4832 wrote to memory of 1036 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 106 PID 4832 wrote to memory of 1036 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 106 PID 4832 wrote to memory of 1352 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 107 PID 4832 wrote to memory of 1352 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 107 PID 4832 wrote to memory of 1352 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 107 PID 4832 wrote to memory of 1244 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 108 PID 4832 wrote to memory of 1244 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 108 PID 4832 wrote to memory of 1244 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 108 PID 4832 wrote to memory of 1000 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 109 PID 4832 wrote to memory of 1000 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 109 PID 4832 wrote to memory of 1000 4832 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 109 PID 1000 wrote to memory of 3140 1000 cmd.exe 114 PID 1000 wrote to memory of 3140 1000 cmd.exe 114 PID 1000 wrote to memory of 3140 1000 cmd.exe 114 PID 4732 wrote to memory of 5040 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 115 PID 4732 wrote to memory of 5040 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 115 PID 4732 wrote to memory of 5040 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 115 PID 5040 wrote to memory of 1116 5040 cmd.exe 117 PID 5040 wrote to memory of 1116 5040 cmd.exe 117 PID 5040 wrote to memory of 1116 5040 cmd.exe 117 PID 4732 wrote to memory of 3180 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 118 PID 4732 wrote to memory of 3180 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 118 PID 4732 wrote to memory of 3180 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 118 PID 4732 wrote to memory of 1236 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 119 PID 4732 wrote to memory of 1236 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 119 PID 4732 wrote to memory of 1236 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 119 PID 4732 wrote to memory of 3300 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 120 PID 4732 wrote to memory of 3300 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 120 PID 4732 wrote to memory of 3300 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 120 PID 4732 wrote to memory of 5056 4732 20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe 121
Processes
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe"C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\OGUwssEA\hCkUwgwQ.exe"C:\Users\Admin\OGUwssEA\hCkUwgwQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2888
-
-
C:\ProgramData\RwsUQEsM\MoAUAwgw.exe"C:\ProgramData\RwsUQEsM\MoAUAwgw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2016
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"8⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"10⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"12⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"14⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"16⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"18⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"20⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"22⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"24⤵PID:2208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:2748
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"26⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"28⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"30⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"32⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock33⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"34⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock35⤵PID:3228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"36⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock37⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"38⤵PID:1652
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV139⤵PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock39⤵PID:748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"40⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock41⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"42⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock43⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"44⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock45⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"46⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock47⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"48⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock49⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"50⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock51⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"52⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock53⤵PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"54⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock55⤵PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"56⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock57⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"58⤵PID:2308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock59⤵PID:396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"60⤵PID:1412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:3428
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock61⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"62⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock63⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"64⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock65⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"66⤵
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock67⤵PID:844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"68⤵
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock69⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"70⤵PID:1496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock71⤵
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"72⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock73⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"74⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock75⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"76⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock77⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"78⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock79⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"80⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock81⤵PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"82⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock83⤵PID:4752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"84⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock85⤵PID:2736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"86⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock87⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"88⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock89⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"90⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock91⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"92⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock93⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"94⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock95⤵PID:3236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"96⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock97⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"98⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock99⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"100⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock101⤵
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"102⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock103⤵PID:1448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"104⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock105⤵PID:844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"106⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock107⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"108⤵PID:2308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock109⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"110⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock111⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"112⤵PID:4824
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:976
-
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock113⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"114⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock115⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"116⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock117⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"118⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock119⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"120⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock.exeC:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock121⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\20240920006fbb7a7a5386fe5629f895d8969b45virlock"122⤵PID:4336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-