Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20/11/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe
-
Size
110KB
-
MD5
92f7d5f7ac3f057a1327549922c438b5
-
SHA1
7121142f80d0abfccf9a99f6d3e4fa071a760075
-
SHA256
38f8ab30ad8b455fb43a8ac3f067270df8a694aa25a1a3f1fe1b25e0175ac99a
-
SHA512
05bd1c7241a0594cb069ea63bac206c181516b5efbd137cc1f7101521fc6ec8989997993edd2ad97ecacc654e6cf2406b872ce0f459b5bf147e535b4da91186e
-
SSDEEP
3072:4yn7YTtqpeACe2whxxQHmOVM8kfebUb/7BXmMP:4OYTtqJCBIxQHmOVwfeS7BW4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (85) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation PSAgQEIY.exe -
Executes dropped EXE 2 IoCs
pid Process 2620 PSAgQEIY.exe 4756 MAwgMwgs.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PSAgQEIY.exe = "C:\\Users\\Admin\\OMQggIQw\\PSAgQEIY.exe" 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MAwgMwgs.exe = "C:\\ProgramData\\YAsUosYg\\MAwgMwgs.exe" 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PSAgQEIY.exe = "C:\\Users\\Admin\\OMQggIQw\\PSAgQEIY.exe" PSAgQEIY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MAwgMwgs.exe = "C:\\ProgramData\\YAsUosYg\\MAwgMwgs.exe" MAwgMwgs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1840 reg.exe 2692 reg.exe 4872 reg.exe 2340 reg.exe 1420 reg.exe 2872 reg.exe 1504 reg.exe 4724 reg.exe 3056 reg.exe 2972 reg.exe 4832 reg.exe 1592 reg.exe 2072 reg.exe 1508 reg.exe 3752 reg.exe 416 reg.exe 4796 reg.exe 3820 reg.exe 1480 reg.exe 632 reg.exe 2964 reg.exe 4052 reg.exe 3992 reg.exe 4368 reg.exe 4584 reg.exe 4592 reg.exe 400 reg.exe 1700 reg.exe 4316 reg.exe 1508 reg.exe 4424 reg.exe 3604 reg.exe 2480 reg.exe 464 reg.exe 1592 reg.exe 3620 reg.exe 3056 reg.exe 2396 reg.exe 1420 reg.exe 464 reg.exe 4744 reg.exe 4740 reg.exe 5072 reg.exe 2460 reg.exe 60 reg.exe 2148 reg.exe 2448 reg.exe 1064 reg.exe 3460 reg.exe 4508 reg.exe 1516 reg.exe 5004 reg.exe 4892 reg.exe 2568 reg.exe 4960 reg.exe 2328 reg.exe 1600 reg.exe 460 reg.exe 1864 reg.exe 2884 reg.exe 3480 reg.exe 64 reg.exe 3716 reg.exe 3428 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 216 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 216 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 216 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 216 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1104 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1104 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1104 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1104 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4228 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4228 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4228 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4228 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2716 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2716 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2716 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2716 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4576 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5072 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5072 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5072 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 5072 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1664 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1664 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1664 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 1664 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3428 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3428 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3428 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3428 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 324 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 324 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 324 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 324 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4436 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4436 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4436 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4436 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2420 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2420 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2420 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 2420 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3772 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3772 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3772 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 3772 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4112 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4112 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4112 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 4112 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 PSAgQEIY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe 2620 PSAgQEIY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2620 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 83 PID 5004 wrote to memory of 2620 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 83 PID 5004 wrote to memory of 2620 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 83 PID 5004 wrote to memory of 4756 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 84 PID 5004 wrote to memory of 4756 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 84 PID 5004 wrote to memory of 4756 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 84 PID 5004 wrote to memory of 1504 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 85 PID 5004 wrote to memory of 1504 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 85 PID 5004 wrote to memory of 1504 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 85 PID 5004 wrote to memory of 3716 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 87 PID 5004 wrote to memory of 3716 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 87 PID 5004 wrote to memory of 3716 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 87 PID 5004 wrote to memory of 2448 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 88 PID 5004 wrote to memory of 2448 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 88 PID 5004 wrote to memory of 2448 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 88 PID 5004 wrote to memory of 3892 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 89 PID 5004 wrote to memory of 3892 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 89 PID 5004 wrote to memory of 3892 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 89 PID 5004 wrote to memory of 2404 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 90 PID 5004 wrote to memory of 2404 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 90 PID 5004 wrote to memory of 2404 5004 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 90 PID 1504 wrote to memory of 4052 1504 cmd.exe 95 PID 1504 wrote to memory of 4052 1504 cmd.exe 95 PID 1504 wrote to memory of 4052 1504 cmd.exe 95 PID 2404 wrote to memory of 2368 2404 cmd.exe 96 PID 2404 wrote to memory of 2368 2404 cmd.exe 96 PID 2404 wrote to memory of 2368 2404 cmd.exe 96 PID 4052 wrote to memory of 1140 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 97 PID 4052 wrote to memory of 1140 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 97 PID 4052 wrote to memory of 1140 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 97 PID 1140 wrote to memory of 4544 1140 cmd.exe 99 PID 1140 wrote to memory of 4544 1140 cmd.exe 99 PID 1140 wrote to memory of 4544 1140 cmd.exe 99 PID 4052 wrote to memory of 4964 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 100 PID 4052 wrote to memory of 4964 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 100 PID 4052 wrote to memory of 4964 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 100 PID 4052 wrote to memory of 3424 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 101 PID 4052 wrote to memory of 3424 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 101 PID 4052 wrote to memory of 3424 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 101 PID 4052 wrote to memory of 3480 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 102 PID 4052 wrote to memory of 3480 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 102 PID 4052 wrote to memory of 3480 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 102 PID 4052 wrote to memory of 4124 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 103 PID 4052 wrote to memory of 4124 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 103 PID 4052 wrote to memory of 4124 4052 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 103 PID 4124 wrote to memory of 684 4124 cmd.exe 108 PID 4124 wrote to memory of 684 4124 cmd.exe 108 PID 4124 wrote to memory of 684 4124 cmd.exe 108 PID 4544 wrote to memory of 112 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 109 PID 4544 wrote to memory of 112 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 109 PID 4544 wrote to memory of 112 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 109 PID 112 wrote to memory of 216 112 cmd.exe 111 PID 112 wrote to memory of 216 112 cmd.exe 111 PID 112 wrote to memory of 216 112 cmd.exe 111 PID 4544 wrote to memory of 4808 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 112 PID 4544 wrote to memory of 4808 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 112 PID 4544 wrote to memory of 4808 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 112 PID 4544 wrote to memory of 1420 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 113 PID 4544 wrote to memory of 1420 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 113 PID 4544 wrote to memory of 1420 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 113 PID 4544 wrote to memory of 1696 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 114 PID 4544 wrote to memory of 1696 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 114 PID 4544 wrote to memory of 1696 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 114 PID 4544 wrote to memory of 376 4544 2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\OMQggIQw\PSAgQEIY.exe"C:\Users\Admin\OMQggIQw\PSAgQEIY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2620
-
-
C:\ProgramData\YAsUosYg\MAwgMwgs.exe"C:\ProgramData\YAsUosYg\MAwgMwgs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"8⤵
- System Location Discovery: System Language Discovery
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock9⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"10⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"12⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"14⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"16⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"18⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"20⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"22⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"24⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"26⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"28⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"30⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"32⤵PID:3236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock33⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"34⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock35⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"36⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock37⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"38⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock39⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"40⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock41⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"42⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock43⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"44⤵PID:1184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV145⤵PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock45⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"46⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock47⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"48⤵PID:2132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock49⤵PID:1504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"50⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock51⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"52⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock53⤵PID:1660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"54⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock55⤵PID:3992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"56⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock57⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"58⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock59⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"60⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock61⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"62⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock63⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"64⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock65⤵PID:2332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"66⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock67⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"68⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock69⤵PID:4908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"70⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock71⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"72⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock73⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"74⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock75⤵PID:2692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"76⤵PID:3892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock77⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"78⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock79⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"80⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock81⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"82⤵
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock83⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"84⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock85⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"86⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock87⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"88⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock89⤵PID:3568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"90⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock91⤵PID:2344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"92⤵PID:1516
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:3376
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock93⤵PID:1108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"94⤵PID:4428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4516
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock95⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"96⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock97⤵
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"98⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock99⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"100⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock101⤵PID:2244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"102⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock103⤵PID:4816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"104⤵PID:3612
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock105⤵PID:1388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"106⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock107⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"108⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock109⤵PID:416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"110⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock111⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"112⤵PID:4872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock113⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"114⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock115⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"116⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock117⤵PID:244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"118⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock119⤵PID:1108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"120⤵PID:3480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock121⤵PID:416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-20_92f7d5f7ac3f057a1327549922c438b5_virlock"122⤵PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-