Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 13:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
-
Size
110KB
-
MD5
92f7d5f7ac3f057a1327549922c438b5
-
SHA1
7121142f80d0abfccf9a99f6d3e4fa071a760075
-
SHA256
38f8ab30ad8b455fb43a8ac3f067270df8a694aa25a1a3f1fe1b25e0175ac99a
-
SHA512
05bd1c7241a0594cb069ea63bac206c181516b5efbd137cc1f7101521fc6ec8989997993edd2ad97ecacc654e6cf2406b872ce0f459b5bf147e535b4da91186e
-
SSDEEP
3072:4yn7YTtqpeACe2whxxQHmOVM8kfebUb/7BXmMP:4OYTtqJCBIxQHmOVwfeS7BW4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Control Panel\International\Geo\Nation XasgIMsw.exe -
Executes dropped EXE 2 IoCs
pid Process 2384 XasgIMsw.exe 1788 bCkkIsQY.exe -
Loads dropped DLL 20 IoCs
pid Process 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\XasgIMsw.exe = "C:\\Users\\Admin\\nUcIwksQ\\XasgIMsw.exe" 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bCkkIsQY.exe = "C:\\ProgramData\\bWgUMcMQ\\bCkkIsQY.exe" 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\XasgIMsw.exe = "C:\\Users\\Admin\\nUcIwksQ\\XasgIMsw.exe" XasgIMsw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bCkkIsQY.exe = "C:\\ProgramData\\bWgUMcMQ\\bCkkIsQY.exe" bCkkIsQY.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico XasgIMsw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XasgIMsw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2012 reg.exe 1700 reg.exe 1992 reg.exe 388 reg.exe 3048 reg.exe 2580 reg.exe 2748 reg.exe 1752 reg.exe 976 reg.exe 1548 reg.exe 2788 reg.exe 2240 reg.exe 1480 reg.exe 2832 reg.exe 2908 reg.exe 1580 reg.exe 2728 reg.exe 2912 reg.exe 1960 reg.exe 352 reg.exe 1964 reg.exe 752 reg.exe 2548 reg.exe 2736 reg.exe 2764 reg.exe 960 reg.exe 3012 reg.exe 2484 reg.exe 756 reg.exe 1932 reg.exe 2292 reg.exe 2028 reg.exe 2576 reg.exe 2812 reg.exe 2456 reg.exe 3044 reg.exe 2164 reg.exe 2460 reg.exe 1012 reg.exe 880 reg.exe 1708 reg.exe 2176 reg.exe 1968 reg.exe 484 reg.exe 2472 reg.exe 900 reg.exe 2736 reg.exe 2028 reg.exe 1576 reg.exe 1572 reg.exe 2736 reg.exe 1092 reg.exe 2864 reg.exe 560 reg.exe 2420 reg.exe 1580 reg.exe 348 reg.exe 2824 reg.exe 848 reg.exe 2484 reg.exe 2332 reg.exe 2196 reg.exe 2100 reg.exe 2364 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2468 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2468 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2984 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2984 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 376 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 376 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1796 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1796 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1936 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1936 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2636 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2636 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2804 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2804 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1220 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1220 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1084 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1084 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1340 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1340 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1500 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1500 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2316 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2316 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2712 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2712 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1652 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1652 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1188 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1188 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 348 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 348 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2648 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2648 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1892 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1892 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1320 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1320 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2240 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2240 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2276 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2276 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3036 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3036 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1488 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1488 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3008 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3008 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2108 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2108 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1668 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1668 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1992 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1992 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1892 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1892 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2208 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2208 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2384 XasgIMsw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe 2384 XasgIMsw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2384 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 30 PID 1588 wrote to memory of 2384 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 30 PID 1588 wrote to memory of 2384 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 30 PID 1588 wrote to memory of 2384 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 30 PID 1588 wrote to memory of 1788 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 31 PID 1588 wrote to memory of 1788 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 31 PID 1588 wrote to memory of 1788 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 31 PID 1588 wrote to memory of 1788 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 31 PID 1588 wrote to memory of 2756 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 32 PID 1588 wrote to memory of 2756 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 32 PID 1588 wrote to memory of 2756 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 32 PID 1588 wrote to memory of 2756 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 32 PID 2756 wrote to memory of 2848 2756 cmd.exe 34 PID 2756 wrote to memory of 2848 2756 cmd.exe 34 PID 2756 wrote to memory of 2848 2756 cmd.exe 34 PID 2756 wrote to memory of 2848 2756 cmd.exe 34 PID 1588 wrote to memory of 2912 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 35 PID 1588 wrote to memory of 2912 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 35 PID 1588 wrote to memory of 2912 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 35 PID 1588 wrote to memory of 2912 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 35 PID 1588 wrote to memory of 2812 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 36 PID 1588 wrote to memory of 2812 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 36 PID 1588 wrote to memory of 2812 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 36 PID 1588 wrote to memory of 2812 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 36 PID 1588 wrote to memory of 2752 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 37 PID 1588 wrote to memory of 2752 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 37 PID 1588 wrote to memory of 2752 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 37 PID 1588 wrote to memory of 2752 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 37 PID 1588 wrote to memory of 1056 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 38 PID 1588 wrote to memory of 1056 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 38 PID 1588 wrote to memory of 1056 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 38 PID 1588 wrote to memory of 1056 1588 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 38 PID 1056 wrote to memory of 2748 1056 cmd.exe 43 PID 1056 wrote to memory of 2748 1056 cmd.exe 43 PID 1056 wrote to memory of 2748 1056 cmd.exe 43 PID 1056 wrote to memory of 2748 1056 cmd.exe 43 PID 2848 wrote to memory of 2664 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 44 PID 2848 wrote to memory of 2664 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 44 PID 2848 wrote to memory of 2664 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 44 PID 2848 wrote to memory of 2664 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 44 PID 2664 wrote to memory of 2468 2664 cmd.exe 46 PID 2664 wrote to memory of 2468 2664 cmd.exe 46 PID 2664 wrote to memory of 2468 2664 cmd.exe 46 PID 2664 wrote to memory of 2468 2664 cmd.exe 46 PID 2848 wrote to memory of 2804 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 47 PID 2848 wrote to memory of 2804 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 47 PID 2848 wrote to memory of 2804 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 47 PID 2848 wrote to memory of 2804 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 47 PID 2848 wrote to memory of 2788 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 48 PID 2848 wrote to memory of 2788 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 48 PID 2848 wrote to memory of 2788 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 48 PID 2848 wrote to memory of 2788 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 48 PID 2848 wrote to memory of 1228 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 50 PID 2848 wrote to memory of 1228 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 50 PID 2848 wrote to memory of 1228 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 50 PID 2848 wrote to memory of 1228 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 50 PID 2848 wrote to memory of 2056 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 52 PID 2848 wrote to memory of 2056 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 52 PID 2848 wrote to memory of 2056 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 52 PID 2848 wrote to memory of 2056 2848 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 52 PID 2056 wrote to memory of 2300 2056 cmd.exe 55 PID 2056 wrote to memory of 2300 2056 cmd.exe 55 PID 2056 wrote to memory of 2300 2056 cmd.exe 55 PID 2056 wrote to memory of 2300 2056 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\nUcIwksQ\XasgIMsw.exe"C:\Users\Admin\nUcIwksQ\XasgIMsw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2384
-
-
C:\ProgramData\bWgUMcMQ\bCkkIsQY.exe"C:\ProgramData\bWgUMcMQ\bCkkIsQY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1788
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"6⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"8⤵PID:484
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"10⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"12⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"14⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"16⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"18⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"20⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"22⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"24⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"26⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"28⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"30⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"32⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"34⤵
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"36⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock37⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"38⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"40⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock41⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"42⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"44⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock45⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"46⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"48⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock49⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"50⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"52⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"54⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"56⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"58⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"60⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"62⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock63⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"64⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock65⤵PID:1140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"66⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock67⤵PID:1036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"68⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock69⤵PID:2184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"70⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock71⤵PID:2064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"72⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock73⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"74⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock75⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"76⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock77⤵PID:1472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"78⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock79⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"80⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock81⤵PID:1640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"82⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock83⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"84⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock85⤵PID:2056
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"86⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock87⤵PID:2872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"88⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock89⤵PID:796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"90⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock91⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"92⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock93⤵
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"94⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock95⤵PID:2080
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"96⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock97⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"98⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock99⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"100⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock101⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"102⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock103⤵PID:2916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"104⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock105⤵PID:1500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"106⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock107⤵PID:1424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"108⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock109⤵PID:2596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"110⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock111⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"112⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock113⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"114⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock115⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"116⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock117⤵PID:1680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"118⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock119⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"120⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock121⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"122⤵PID:2612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-