Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe
-
Size
140KB
-
MD5
ad7bb4d0b054545954fcdec26bf7bf7d
-
SHA1
bc046bf7bce6a468fbc1758c0bc726fef522e232
-
SHA256
3b91d82a5858cdecbb1a108570b061ddc81b79910f0e19c08e7a984c7f0c32b7
-
SHA512
0d2b3d3703cafaa334b7b1021e8f78e058633284d704cff0c9aafdcc2a234fb7034d06d3b827e3d112f9a20ca094fe641bf55989c303bf053f28078b36d46697
-
SSDEEP
3072:CBehCANLxmj42ycaA3NSUp7TndGfR89B+/2K4Ka:CBwj32ycaA3N/pc58v+/2K4Ka
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Renames multiple (56) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 28 3064 Process not Found 32 3064 Process not Found 34 3064 Process not Found 36 3064 Process not Found 38 3064 Process not Found -
Executes dropped EXE 3 IoCs
pid Process 2032 EyMcAQYM.exe 456 SQQwMQgo.exe 4264 EyMcAQYM.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EyMcAQYM.exe = "C:\\Users\\Admin\\JIIYgsEw\\EyMcAQYM.exe" 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EyMcAQYM.exe = "C:\\Users\\Admin\\JIIYgsEw\\EyMcAQYM.exe" EyMcAQYM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EyMcAQYM.exe = "C:\\Users\\Admin\\JIIYgsEw\\EyMcAQYM.exe" 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SQQwMQgo.exe = "C:\\ProgramData\\lsIMUYgY\\SQQwMQgo.exe" 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EyMcAQYM.exe = "C:\\Users\\Admin\\JIIYgsEw\\EyMcAQYM.exe" EyMcAQYM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SQQwMQgo.exe = "C:\\ProgramData\\lsIMUYgY\\SQQwMQgo.exe" SQQwMQgo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GuUUsMMU.exe = "C:\\Users\\Admin\\FIkcAwsM\\GuUUsMMU.exe" 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\aoEsQswU.exe = "C:\\ProgramData\\BqowMcYg\\aoEsQswU.exe" 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 1692 3488 WerFault.exe 785 4236 2756 WerFault.exe 784 4088 2032 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3180 Process not Found 3968 Process not Found 412 reg.exe 3168 reg.exe 4100 Process not Found 2924 Process not Found 384 Process not Found 608 Process not Found 3376 reg.exe 5052 reg.exe 3644 reg.exe 2056 Process not Found 2640 Process not Found 5032 Process not Found 2752 Process not Found 3452 Process not Found 3988 reg.exe 1520 Process not Found 2260 reg.exe 1968 reg.exe 916 Process not Found 2252 Process not Found 1560 reg.exe 4372 Process not Found 3168 reg.exe 832 reg.exe 4820 Process not Found 4620 Process not Found 1416 Process not Found 2376 Process not Found 3720 Process not Found 872 reg.exe 2924 reg.exe 2040 reg.exe 2640 Process not Found 2824 reg.exe 4876 Process not Found 244 Process not Found 3140 Process not Found 4840 Process not Found 2668 Process not Found 3840 Process not Found 4664 Process not Found 2352 Process not Found 4836 Process not Found 2872 reg.exe 2176 reg.exe 3240 reg.exe 3944 Process not Found 1356 Process not Found 3492 Process not Found 4972 Process not Found 1872 reg.exe 1884 Process not Found 4828 Process not Found 2196 Process not Found 5108 Process not Found 2452 reg.exe 1688 Process not Found 3108 Process not Found 2600 Process not Found 4672 Process not Found 3936 reg.exe 744 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2116 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2116 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2116 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2116 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3100 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3100 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3100 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3100 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 8 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 8 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 8 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 8 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1396 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1396 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1396 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1396 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1940 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1940 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1940 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1940 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1660 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1660 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1660 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1660 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2444 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2444 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2444 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 2444 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1924 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1924 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1924 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1924 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1448 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1448 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1448 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1448 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 228 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 228 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 228 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 228 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 4616 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 4616 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 4616 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 4616 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1060 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1060 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1060 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 1060 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3972 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3972 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3972 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 3972 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2032 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 86 PID 1996 wrote to memory of 2032 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 86 PID 1996 wrote to memory of 2032 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 86 PID 1996 wrote to memory of 456 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 87 PID 1996 wrote to memory of 456 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 87 PID 1996 wrote to memory of 456 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 87 PID 1996 wrote to memory of 1992 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 88 PID 1996 wrote to memory of 1992 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 88 PID 1996 wrote to memory of 1992 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 88 PID 1996 wrote to memory of 2636 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 90 PID 1996 wrote to memory of 2636 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 90 PID 1996 wrote to memory of 2636 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 90 PID 1996 wrote to memory of 4060 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 91 PID 1996 wrote to memory of 4060 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 91 PID 1996 wrote to memory of 4060 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 91 PID 1996 wrote to memory of 1832 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 92 PID 1996 wrote to memory of 1832 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 92 PID 1996 wrote to memory of 1832 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 92 PID 1996 wrote to memory of 1404 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 93 PID 1996 wrote to memory of 1404 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 93 PID 1996 wrote to memory of 1404 1996 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 93 PID 1992 wrote to memory of 3964 1992 cmd.exe 98 PID 1992 wrote to memory of 3964 1992 cmd.exe 98 PID 1992 wrote to memory of 3964 1992 cmd.exe 98 PID 1404 wrote to memory of 224 1404 cmd.exe 99 PID 1404 wrote to memory of 224 1404 cmd.exe 99 PID 1404 wrote to memory of 224 1404 cmd.exe 99 PID 3964 wrote to memory of 112 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 100 PID 3964 wrote to memory of 112 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 100 PID 3964 wrote to memory of 112 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 100 PID 112 wrote to memory of 3936 112 cmd.exe 102 PID 112 wrote to memory of 3936 112 cmd.exe 102 PID 112 wrote to memory of 3936 112 cmd.exe 102 PID 3964 wrote to memory of 3828 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 103 PID 3964 wrote to memory of 3828 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 103 PID 3964 wrote to memory of 3828 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 103 PID 3964 wrote to memory of 3744 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 104 PID 3964 wrote to memory of 3744 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 104 PID 3964 wrote to memory of 3744 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 104 PID 3964 wrote to memory of 4176 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 105 PID 3964 wrote to memory of 4176 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 105 PID 3964 wrote to memory of 4176 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 105 PID 3964 wrote to memory of 1972 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 106 PID 3964 wrote to memory of 1972 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 106 PID 3964 wrote to memory of 1972 3964 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 106 PID 1972 wrote to memory of 4088 1972 cmd.exe 111 PID 1972 wrote to memory of 4088 1972 cmd.exe 111 PID 1972 wrote to memory of 4088 1972 cmd.exe 111 PID 3936 wrote to memory of 4104 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 112 PID 3936 wrote to memory of 4104 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 112 PID 3936 wrote to memory of 4104 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 112 PID 4104 wrote to memory of 2116 4104 cmd.exe 114 PID 4104 wrote to memory of 2116 4104 cmd.exe 114 PID 4104 wrote to memory of 2116 4104 cmd.exe 114 PID 3936 wrote to memory of 3488 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 115 PID 3936 wrote to memory of 3488 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 115 PID 3936 wrote to memory of 3488 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 115 PID 3936 wrote to memory of 4976 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 116 PID 3936 wrote to memory of 4976 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 116 PID 3936 wrote to memory of 4976 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 116 PID 3936 wrote to memory of 872 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 117 PID 3936 wrote to memory of 872 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 117 PID 3936 wrote to memory of 872 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 117 PID 3936 wrote to memory of 4376 3936 2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\JIIYgsEw\EyMcAQYM.exe"C:\Users\Admin\JIIYgsEw\EyMcAQYM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 12923⤵
- Program crash
PID:4088
-
-
-
C:\ProgramData\lsIMUYgY\SQQwMQgo.exe"C:\ProgramData\lsIMUYgY\SQQwMQgo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"8⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"10⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:8 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"12⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"14⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"16⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"18⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"20⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"22⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"24⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"26⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"28⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"30⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"32⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock33⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"34⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock35⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"36⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock37⤵PID:912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"38⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock39⤵PID:4368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"40⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock41⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"42⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock43⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"44⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock45⤵PID:1100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"46⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock47⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"48⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock49⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"50⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock51⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"52⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock53⤵PID:4900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"54⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock55⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"56⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock57⤵PID:1608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"58⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock59⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"60⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock61⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"62⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock63⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"64⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock65⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"66⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock67⤵PID:4344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"68⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock69⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"70⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock71⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"72⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock73⤵PID:4672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"74⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock75⤵PID:316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"76⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock77⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"78⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock79⤵PID:1188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"80⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock81⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"82⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock83⤵PID:2192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"84⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock85⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"86⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock87⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"88⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock89⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"90⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock91⤵PID:4300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"92⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock93⤵PID:4820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"94⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock95⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"96⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock97⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"98⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock99⤵PID:3588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"100⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock101⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"102⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock103⤵PID:544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"104⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock105⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"106⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock107⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"108⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock109⤵PID:1716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"110⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock111⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"112⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock113⤵PID:2424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"114⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock115⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"116⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock117⤵
- Adds Run key to start application
PID:2200 -
C:\Users\Admin\FIkcAwsM\GuUUsMMU.exe"C:\Users\Admin\FIkcAwsM\GuUUsMMU.exe"118⤵PID:2756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 224119⤵
- Program crash
PID:4236
-
-
-
C:\ProgramData\BqowMcYg\aoEsQswU.exe"C:\ProgramData\BqowMcYg\aoEsQswU.exe"118⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3488 -s 224119⤵
- Program crash
PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"118⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock119⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"120⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock121⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-10-13_ad7bb4d0b054545954fcdec26bf7bf7d_virlock"122⤵PID:3044
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-