Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 16:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe
-
Size
208KB
-
MD5
2f402c0cdceed59f7215a9f9d9396836
-
SHA1
9c2db00220feb1fb238c9702271e02f18fd2e0f5
-
SHA256
02a18fe83691b5a5d8cb9664bf45408ec425737c526455cf75db394659a8bfa0
-
SHA512
3b22eedecf62213fc9ade6f7ec98fe587392c0b2544a04a5668a241ddf716c18768f5d1d3361b20c9e8c0f85de518c9b7e0cf45b550817d0c9512defbabfb7c4
-
SSDEEP
3072:Dt9olq1YK/B+EdT9KxguX5upzMD4DuRO4Vgh8OBIRBinkyHL5O4zTzXk:zoqtsEdA68ux5g0BI6nkyrpznXk
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\International\Geo\Nation ViIIcoIo.exe -
Executes dropped EXE 2 IoCs
pid Process 2064 ViIIcoIo.exe 1808 TiwUEgMQ.exe -
Loads dropped DLL 20 IoCs
pid Process 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ViIIcoIo.exe = "C:\\Users\\Admin\\jkIEUUwY\\ViIIcoIo.exe" ViIIcoIo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TiwUEgMQ.exe = "C:\\ProgramData\\ncYQoYsE\\TiwUEgMQ.exe" TiwUEgMQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ViIIcoIo.exe = "C:\\Users\\Admin\\jkIEUUwY\\ViIIcoIo.exe" 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TiwUEgMQ.exe = "C:\\ProgramData\\ncYQoYsE\\TiwUEgMQ.exe" 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico ViIIcoIo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TiwUEgMQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2972 reg.exe 2292 reg.exe 2696 reg.exe 2828 reg.exe 1720 reg.exe 872 reg.exe 644 reg.exe 2900 reg.exe 2440 reg.exe 2776 reg.exe 1908 reg.exe 2276 reg.exe 2168 reg.exe 684 reg.exe 2708 reg.exe 1620 reg.exe 2460 reg.exe 2784 reg.exe 1620 reg.exe 1744 reg.exe 2292 reg.exe 1748 reg.exe 2352 reg.exe 2672 reg.exe 2480 reg.exe 2400 reg.exe 2452 reg.exe 2704 reg.exe 1720 reg.exe 1848 reg.exe 2920 reg.exe 2732 reg.exe 2104 reg.exe 1364 reg.exe 2516 reg.exe 904 reg.exe 2472 reg.exe 1652 reg.exe 2032 reg.exe 700 reg.exe 2908 reg.exe 2656 reg.exe 1612 reg.exe 1588 reg.exe 2416 reg.exe 2352 reg.exe 1732 reg.exe 2872 reg.exe 2788 reg.exe 1120 reg.exe 1596 reg.exe 2880 reg.exe 1500 reg.exe 904 reg.exe 2292 reg.exe 2276 reg.exe 1568 reg.exe 2756 reg.exe 2176 reg.exe 2620 reg.exe 2532 reg.exe 836 reg.exe 2564 reg.exe 1612 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2696 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2696 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1968 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1968 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1644 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1644 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2012 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2012 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2476 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2476 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2568 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2568 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2096 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2096 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1276 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1276 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1652 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1652 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 584 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 584 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1856 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1856 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2964 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2964 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1596 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1596 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 448 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 448 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1364 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1364 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 332 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 332 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2236 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2236 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2676 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2676 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2624 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2624 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 768 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 768 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2308 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2308 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2776 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2776 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2136 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2136 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1456 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1456 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2936 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2936 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2428 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2428 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2320 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2320 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2040 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2040 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2840 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 2840 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1564 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 1564 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2064 ViIIcoIo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe 2064 ViIIcoIo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2064 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 30 PID 2092 wrote to memory of 2064 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 30 PID 2092 wrote to memory of 2064 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 30 PID 2092 wrote to memory of 2064 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 30 PID 2092 wrote to memory of 1808 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 31 PID 2092 wrote to memory of 1808 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 31 PID 2092 wrote to memory of 1808 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 31 PID 2092 wrote to memory of 1808 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 31 PID 2092 wrote to memory of 3020 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 32 PID 2092 wrote to memory of 3020 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 32 PID 2092 wrote to memory of 3020 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 32 PID 2092 wrote to memory of 3020 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 32 PID 3020 wrote to memory of 2104 3020 cmd.exe 34 PID 3020 wrote to memory of 2104 3020 cmd.exe 34 PID 3020 wrote to memory of 2104 3020 cmd.exe 34 PID 3020 wrote to memory of 2104 3020 cmd.exe 34 PID 2092 wrote to memory of 2344 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 35 PID 2092 wrote to memory of 2344 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 35 PID 2092 wrote to memory of 2344 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 35 PID 2092 wrote to memory of 2344 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 35 PID 2092 wrote to memory of 1516 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 36 PID 2092 wrote to memory of 1516 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 36 PID 2092 wrote to memory of 1516 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 36 PID 2092 wrote to memory of 1516 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 36 PID 2092 wrote to memory of 2956 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 38 PID 2092 wrote to memory of 2956 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 38 PID 2092 wrote to memory of 2956 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 38 PID 2092 wrote to memory of 2956 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 38 PID 2092 wrote to memory of 2704 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 41 PID 2092 wrote to memory of 2704 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 41 PID 2092 wrote to memory of 2704 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 41 PID 2092 wrote to memory of 2704 2092 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 41 PID 2704 wrote to memory of 2712 2704 cmd.exe 43 PID 2704 wrote to memory of 2712 2704 cmd.exe 43 PID 2704 wrote to memory of 2712 2704 cmd.exe 43 PID 2704 wrote to memory of 2712 2704 cmd.exe 43 PID 2104 wrote to memory of 2872 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 44 PID 2104 wrote to memory of 2872 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 44 PID 2104 wrote to memory of 2872 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 44 PID 2104 wrote to memory of 2872 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 44 PID 2872 wrote to memory of 2696 2872 cmd.exe 46 PID 2872 wrote to memory of 2696 2872 cmd.exe 46 PID 2872 wrote to memory of 2696 2872 cmd.exe 46 PID 2872 wrote to memory of 2696 2872 cmd.exe 46 PID 2104 wrote to memory of 2564 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 47 PID 2104 wrote to memory of 2564 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 47 PID 2104 wrote to memory of 2564 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 47 PID 2104 wrote to memory of 2564 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 47 PID 2104 wrote to memory of 2624 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 48 PID 2104 wrote to memory of 2624 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 48 PID 2104 wrote to memory of 2624 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 48 PID 2104 wrote to memory of 2624 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 48 PID 2104 wrote to memory of 2636 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 49 PID 2104 wrote to memory of 2636 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 49 PID 2104 wrote to memory of 2636 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 49 PID 2104 wrote to memory of 2636 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 49 PID 2104 wrote to memory of 2608 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 53 PID 2104 wrote to memory of 2608 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 53 PID 2104 wrote to memory of 2608 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 53 PID 2104 wrote to memory of 2608 2104 2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe 53 PID 2608 wrote to memory of 1688 2608 cmd.exe 55 PID 2608 wrote to memory of 1688 2608 cmd.exe 55 PID 2608 wrote to memory of 1688 2608 cmd.exe 55 PID 2608 wrote to memory of 1688 2608 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\jkIEUUwY\ViIIcoIo.exe"C:\Users\Admin\jkIEUUwY\ViIIcoIo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2064
-
-
C:\ProgramData\ncYQoYsE\TiwUEgMQ.exe"C:\ProgramData\ncYQoYsE\TiwUEgMQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"6⤵
- System Location Discovery: System Language Discovery
PID:624 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"8⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"10⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"12⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"14⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"16⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"18⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"20⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"22⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"24⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"26⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"28⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"30⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"32⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"34⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"36⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"38⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"40⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"42⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"44⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"46⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock47⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"48⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock49⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"50⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"52⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"54⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"56⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"58⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"60⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"62⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"64⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock65⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"66⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock67⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"68⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock69⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"70⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock71⤵PID:2452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"72⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock73⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"74⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock75⤵PID:1120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"76⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock77⤵PID:932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"78⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock79⤵PID:1408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"80⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock81⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"82⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock83⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"84⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock85⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"86⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock87⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"88⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock89⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"90⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock91⤵PID:468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"92⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock93⤵PID:684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"94⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock95⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"96⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock97⤵PID:1148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"98⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock99⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"100⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock101⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"102⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock103⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"104⤵
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock105⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"106⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock107⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"108⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock109⤵PID:2888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"110⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock111⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"112⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock113⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"114⤵
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock115⤵PID:448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"116⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock117⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"118⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock119⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"120⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock121⤵PID:1092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-10-14_2f402c0cdceed59f7215a9f9d9396836_virlock"122⤵PID:2748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-