Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe
-
Size
121KB
-
MD5
24ac9c6e989b5d7624e35a161746b213
-
SHA1
ac3e10b9bcb9b5c7f6e7e3eb3d3051e6bf02f873
-
SHA256
0abc2028782c87618854f9c04218ec5f60f579bd9c3fb1882f268f1b19b35c5a
-
SHA512
10582c1b96193d4833fe8eaaf8166ea43b646a08f7c6303dddcdd298e774bdfb663c6e581eb9a54dd984b096b8f2695db34b5bf0123c2633967d9cd82e38df14
-
SSDEEP
1536:CV+YuVqHH7RBxtM9pJmbw+uLszXn6hbRhWjYxUWvUgea4nnF6wRohw3r:E+YGSHJtUV+uozXM6lnF6a3r
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation OeswoIcg.exe -
Executes dropped EXE 2 IoCs
pid Process 1512 qaIEcgEE.exe 4040 OeswoIcg.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaIEcgEE.exe = "C:\\Users\\Admin\\hOwUUEoE\\qaIEcgEE.exe" 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OeswoIcg.exe = "C:\\ProgramData\\dUQUYoYI\\OeswoIcg.exe" 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qaIEcgEE.exe = "C:\\Users\\Admin\\hOwUUEoE\\qaIEcgEE.exe" qaIEcgEE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OeswoIcg.exe = "C:\\ProgramData\\dUQUYoYI\\OeswoIcg.exe" OeswoIcg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe qaIEcgEE.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe qaIEcgEE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qaIEcgEE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 428 reg.exe 2776 reg.exe 4244 reg.exe 1856 reg.exe 3172 reg.exe 4440 reg.exe 1848 reg.exe 3372 reg.exe 2228 reg.exe 1400 reg.exe 428 reg.exe 5076 reg.exe 2796 reg.exe 3056 reg.exe 3816 reg.exe 1704 reg.exe 1996 reg.exe 2068 reg.exe 1920 reg.exe 3152 reg.exe 1244 reg.exe 4340 reg.exe 4396 reg.exe 3376 reg.exe 4524 reg.exe 2076 reg.exe 1836 reg.exe 1848 reg.exe 5076 reg.exe 4620 reg.exe 2516 reg.exe 5108 reg.exe 752 reg.exe 208 reg.exe 3580 reg.exe 668 reg.exe 4500 reg.exe 1344 reg.exe 3152 reg.exe 3392 reg.exe 2348 reg.exe 4596 reg.exe 2836 reg.exe 4936 reg.exe 4952 reg.exe 4452 reg.exe 2656 reg.exe 3392 reg.exe 4968 reg.exe 4596 reg.exe 2420 reg.exe 440 reg.exe 1528 reg.exe 1388 reg.exe 5052 reg.exe 1248 reg.exe 3684 reg.exe 5060 reg.exe 1508 reg.exe 2704 reg.exe 2556 reg.exe 3260 reg.exe 4608 reg.exe 2456 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3156 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3156 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3156 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3156 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4820 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4820 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4820 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4820 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1280 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1280 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1280 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 1280 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3516 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3516 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3516 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 3516 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4588 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4588 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4588 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4588 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4904 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4904 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4904 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4904 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5012 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5012 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5012 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5012 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4836 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4836 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4836 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4836 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 2216 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 2216 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 2216 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 2216 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5108 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5108 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5108 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 5108 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4540 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4540 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4540 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4540 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4752 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4752 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4752 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4752 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4924 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4924 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4924 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 4924 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4040 OeswoIcg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe 4040 OeswoIcg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 1512 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 89 PID 4912 wrote to memory of 1512 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 89 PID 4912 wrote to memory of 1512 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 89 PID 4912 wrote to memory of 4040 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 90 PID 4912 wrote to memory of 4040 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 90 PID 4912 wrote to memory of 4040 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 90 PID 4912 wrote to memory of 3372 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 91 PID 4912 wrote to memory of 3372 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 91 PID 4912 wrote to memory of 3372 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 91 PID 3372 wrote to memory of 1764 3372 cmd.exe 93 PID 3372 wrote to memory of 1764 3372 cmd.exe 93 PID 3372 wrote to memory of 1764 3372 cmd.exe 93 PID 4912 wrote to memory of 2316 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 94 PID 4912 wrote to memory of 2316 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 94 PID 4912 wrote to memory of 2316 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 94 PID 4912 wrote to memory of 3060 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 95 PID 4912 wrote to memory of 3060 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 95 PID 4912 wrote to memory of 3060 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 95 PID 4912 wrote to memory of 440 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 96 PID 4912 wrote to memory of 440 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 96 PID 4912 wrote to memory of 440 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 96 PID 4912 wrote to memory of 3492 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 97 PID 4912 wrote to memory of 3492 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 97 PID 4912 wrote to memory of 3492 4912 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 97 PID 3492 wrote to memory of 2096 3492 cmd.exe 102 PID 3492 wrote to memory of 2096 3492 cmd.exe 102 PID 3492 wrote to memory of 2096 3492 cmd.exe 102 PID 1764 wrote to memory of 4816 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 103 PID 1764 wrote to memory of 4816 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 103 PID 1764 wrote to memory of 4816 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 103 PID 4816 wrote to memory of 3188 4816 cmd.exe 105 PID 4816 wrote to memory of 3188 4816 cmd.exe 105 PID 4816 wrote to memory of 3188 4816 cmd.exe 105 PID 1764 wrote to memory of 3696 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 106 PID 1764 wrote to memory of 3696 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 106 PID 1764 wrote to memory of 3696 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 106 PID 1764 wrote to memory of 2796 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 107 PID 1764 wrote to memory of 2796 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 107 PID 1764 wrote to memory of 2796 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 107 PID 1764 wrote to memory of 1156 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 108 PID 1764 wrote to memory of 1156 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 108 PID 1764 wrote to memory of 1156 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 108 PID 1764 wrote to memory of 2500 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 109 PID 1764 wrote to memory of 2500 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 109 PID 1764 wrote to memory of 2500 1764 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 109 PID 2500 wrote to memory of 1492 2500 cmd.exe 114 PID 2500 wrote to memory of 1492 2500 cmd.exe 114 PID 2500 wrote to memory of 1492 2500 cmd.exe 114 PID 3188 wrote to memory of 3496 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 115 PID 3188 wrote to memory of 3496 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 115 PID 3188 wrote to memory of 3496 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 115 PID 3188 wrote to memory of 3180 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 117 PID 3188 wrote to memory of 3180 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 117 PID 3188 wrote to memory of 3180 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 117 PID 3188 wrote to memory of 3192 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 118 PID 3188 wrote to memory of 3192 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 118 PID 3188 wrote to memory of 3192 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 118 PID 3188 wrote to memory of 1836 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 119 PID 3188 wrote to memory of 1836 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 119 PID 3188 wrote to memory of 1836 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 119 PID 3188 wrote to memory of 464 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 120 PID 3188 wrote to memory of 464 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 120 PID 3188 wrote to memory of 464 3188 2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe 120 PID 3496 wrote to memory of 3156 3496 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\hOwUUEoE\qaIEcgEE.exe"C:\Users\Admin\hOwUUEoE\qaIEcgEE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\ProgramData\dUQUYoYI\OeswoIcg.exe"C:\ProgramData\dUQUYoYI\OeswoIcg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"8⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"10⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"12⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"14⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"16⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"18⤵
- System Location Discovery: System Language Discovery
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"20⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"22⤵PID:4244
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"24⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"26⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"28⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"30⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"32⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock33⤵
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock35⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"36⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock37⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"38⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock39⤵PID:2404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"40⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock41⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"42⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock43⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"44⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock45⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"46⤵PID:4408
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock47⤵PID:2656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"48⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock49⤵PID:2756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"50⤵
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock51⤵PID:4032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"52⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock53⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"54⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock55⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"56⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock57⤵
- System Location Discovery: System Language Discovery
PID:32 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"58⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock59⤵PID:4084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"60⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock61⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"62⤵PID:3376
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock63⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"64⤵
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock65⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"66⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock67⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"68⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock69⤵PID:3492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"70⤵PID:716
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock71⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"72⤵
- System Location Discovery: System Language Discovery
PID:32 -
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock73⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"74⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock75⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"76⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock77⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"78⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock79⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"80⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock81⤵PID:412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"82⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock83⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"84⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock85⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"86⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock87⤵PID:2100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"88⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock89⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"90⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock91⤵PID:4360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"92⤵PID:3340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock93⤵PID:1152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"94⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock95⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"96⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock97⤵PID:2440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"98⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock99⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"100⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock101⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"102⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock103⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"104⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock105⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"106⤵PID:3336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock107⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"108⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock109⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"110⤵PID:208
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:2440
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock111⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"112⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock113⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"114⤵PID:1644
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock115⤵PID:640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"116⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock117⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"118⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock119⤵PID:1128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"120⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock121⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-09-27_24ac9c6e989b5d7624e35a161746b213_virlock"122⤵
- System Location Discovery: System Language Discovery
PID:996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-