Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe
-
Size
115KB
-
MD5
7128fe39c0f51169acbbf8f33881b06b
-
SHA1
709b19abc274a0f134f60561d8bfd64fca8f2ed5
-
SHA256
1a6eb2ce513a1c92f261ab533cf7075f4d7b0fb32ad032e343dd41544ff66b81
-
SHA512
98ba998f8c5aca823afe77ab04ab453cc56ab2cccb57afbf92f16407a5b47f3e1febe3aa8b9d0bc8eeca3cabbadee8ab6e18a6e383723d08cddc4cdf8f315379
-
SSDEEP
3072:tYJpW3Unj1DXLaEAOwJi02tmq0wT0Kjr6d:opsUnj1DNPwMmrwTBw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation AiwwAMsY.exe -
Executes dropped EXE 2 IoCs
pid Process 1868 AiwwAMsY.exe 3752 bUMoYsQg.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AiwwAMsY.exe = "C:\\Users\\Admin\\BcYUwksU\\AiwwAMsY.exe" 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bUMoYsQg.exe = "C:\\ProgramData\\mQowwksk\\bUMoYsQg.exe" 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AiwwAMsY.exe = "C:\\Users\\Admin\\BcYUwksU\\AiwwAMsY.exe" AiwwAMsY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bUMoYsQg.exe = "C:\\ProgramData\\mQowwksk\\bUMoYsQg.exe" bUMoYsQg.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe AiwwAMsY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AiwwAMsY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1000 reg.exe 1432 reg.exe 2268 reg.exe 3140 reg.exe 2340 reg.exe 4848 reg.exe 2384 reg.exe 4468 reg.exe 1732 reg.exe 1688 reg.exe 2252 reg.exe 3404 reg.exe 1604 reg.exe 4304 reg.exe 2608 reg.exe 5112 reg.exe 656 reg.exe 1200 reg.exe 1572 reg.exe 2020 reg.exe 4008 reg.exe 1788 reg.exe 3036 reg.exe 3324 reg.exe 5104 reg.exe 2956 reg.exe 1200 reg.exe 2252 reg.exe 4020 reg.exe 3068 reg.exe 3652 reg.exe 4676 reg.exe 3656 reg.exe 3376 reg.exe 4752 reg.exe 3592 reg.exe 3656 reg.exe 4360 reg.exe 2576 reg.exe 1972 reg.exe 3456 reg.exe 3280 reg.exe 3204 reg.exe 5032 reg.exe 1508 reg.exe 1200 reg.exe 1204 reg.exe 1972 reg.exe 3516 reg.exe 1824 reg.exe 5072 reg.exe 4560 reg.exe 1172 reg.exe 2652 reg.exe 3676 reg.exe 2360 reg.exe 876 reg.exe 4208 reg.exe 756 reg.exe 2340 reg.exe 3688 reg.exe 4360 reg.exe 1608 reg.exe 4412 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2296 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2296 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2296 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2296 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1736 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1736 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1736 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 1736 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3056 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3056 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3056 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3056 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2944 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2944 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2944 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2944 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2476 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2476 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2476 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2476 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3516 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3516 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3516 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3516 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4452 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4452 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4452 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4452 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2976 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2976 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2976 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 2976 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 384 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 384 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 384 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 384 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3572 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3572 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3572 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3572 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4088 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4088 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4088 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4088 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3960 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3960 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3960 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 3960 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4156 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4156 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4156 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 4156 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1868 AiwwAMsY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe 1868 AiwwAMsY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 1868 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 86 PID 436 wrote to memory of 1868 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 86 PID 436 wrote to memory of 1868 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 86 PID 436 wrote to memory of 3752 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 87 PID 436 wrote to memory of 3752 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 87 PID 436 wrote to memory of 3752 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 87 PID 436 wrote to memory of 4528 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 88 PID 436 wrote to memory of 4528 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 88 PID 436 wrote to memory of 4528 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 88 PID 4528 wrote to memory of 1248 4528 cmd.exe 90 PID 4528 wrote to memory of 1248 4528 cmd.exe 90 PID 4528 wrote to memory of 1248 4528 cmd.exe 90 PID 436 wrote to memory of 2976 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 91 PID 436 wrote to memory of 2976 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 91 PID 436 wrote to memory of 2976 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 91 PID 436 wrote to memory of 2616 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 92 PID 436 wrote to memory of 2616 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 92 PID 436 wrote to memory of 2616 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 92 PID 436 wrote to memory of 3904 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 93 PID 436 wrote to memory of 3904 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 93 PID 436 wrote to memory of 3904 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 93 PID 436 wrote to memory of 228 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 94 PID 436 wrote to memory of 228 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 94 PID 436 wrote to memory of 228 436 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 94 PID 228 wrote to memory of 4668 228 cmd.exe 99 PID 228 wrote to memory of 4668 228 cmd.exe 99 PID 228 wrote to memory of 4668 228 cmd.exe 99 PID 1248 wrote to memory of 2368 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 100 PID 1248 wrote to memory of 2368 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 100 PID 1248 wrote to memory of 2368 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 100 PID 2368 wrote to memory of 1224 2368 cmd.exe 102 PID 2368 wrote to memory of 1224 2368 cmd.exe 102 PID 2368 wrote to memory of 1224 2368 cmd.exe 102 PID 1248 wrote to memory of 4020 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 103 PID 1248 wrote to memory of 4020 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 103 PID 1248 wrote to memory of 4020 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 103 PID 1248 wrote to memory of 2900 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 104 PID 1248 wrote to memory of 2900 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 104 PID 1248 wrote to memory of 2900 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 104 PID 1248 wrote to memory of 4428 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 105 PID 1248 wrote to memory of 4428 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 105 PID 1248 wrote to memory of 4428 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 105 PID 1248 wrote to memory of 4904 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 106 PID 1248 wrote to memory of 4904 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 106 PID 1248 wrote to memory of 4904 1248 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 106 PID 4904 wrote to memory of 736 4904 cmd.exe 111 PID 4904 wrote to memory of 736 4904 cmd.exe 111 PID 4904 wrote to memory of 736 4904 cmd.exe 111 PID 1224 wrote to memory of 464 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 112 PID 1224 wrote to memory of 464 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 112 PID 1224 wrote to memory of 464 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 112 PID 464 wrote to memory of 2296 464 cmd.exe 114 PID 464 wrote to memory of 2296 464 cmd.exe 114 PID 464 wrote to memory of 2296 464 cmd.exe 114 PID 1224 wrote to memory of 3656 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 115 PID 1224 wrote to memory of 3656 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 115 PID 1224 wrote to memory of 3656 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 115 PID 1224 wrote to memory of 2268 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 116 PID 1224 wrote to memory of 2268 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 116 PID 1224 wrote to memory of 2268 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 116 PID 1224 wrote to memory of 1412 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 117 PID 1224 wrote to memory of 1412 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 117 PID 1224 wrote to memory of 1412 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 117 PID 1224 wrote to memory of 1580 1224 2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\BcYUwksU\AiwwAMsY.exe"C:\Users\Admin\BcYUwksU\AiwwAMsY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1868
-
-
C:\ProgramData\mQowwksk\bUMoYsQg.exe"C:\ProgramData\mQowwksk\bUMoYsQg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3752
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"8⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"10⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"12⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"14⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"16⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"18⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"20⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"22⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"24⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"26⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"28⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"30⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"32⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock33⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"34⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock35⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"36⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock37⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"38⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock39⤵PID:448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"40⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock41⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"42⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock43⤵PID:2260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"44⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock45⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"46⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock47⤵
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"48⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock49⤵PID:1724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"50⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock51⤵PID:4840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"52⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock53⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"54⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock55⤵
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"56⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock57⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"58⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock59⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"60⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock61⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"62⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock63⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"64⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock65⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"66⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock67⤵PID:2012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"68⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock69⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"70⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock71⤵PID:1352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"72⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock73⤵PID:3148
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"74⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock75⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"76⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock77⤵PID:592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"78⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock79⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"80⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock81⤵PID:856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"82⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock83⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"84⤵
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock85⤵PID:228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"86⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock87⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"88⤵
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock89⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"90⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock91⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"92⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock93⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"94⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock95⤵PID:704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"96⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock97⤵PID:1772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"98⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock99⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"100⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock101⤵
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"102⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock103⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"104⤵PID:4140
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock105⤵PID:2468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"106⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock107⤵PID:2856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"108⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock109⤵PID:3036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"110⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock111⤵PID:3280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"112⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock113⤵PID:3604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"114⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock115⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"116⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock117⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"118⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock119⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"120⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock121⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-08_7128fe39c0f51169acbbf8f33881b06b_virlock"122⤵PID:448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-