Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe
-
Size
192KB
-
MD5
4deb641355a2ced75885248619e7e7c8
-
SHA1
fe46b1856c51e85ddcb128235085c3b2bd0a0f51
-
SHA256
cbf90b656abb4199a0f4cfa4b8fc538202540d9b672e7ea5ac9975ae51884b0d
-
SHA512
e7632732617e8664dc3fd05ee12fad0e258507468b1455007a8bf99f3e0494a1e0681bb6e04254c8da2338c8998cde919c0343fdb4caf14fb569fd5f3afd7991
-
SSDEEP
3072:PCvM7zZ8k5E8CenK4tYLt65rU3eF5qaNkQbbAppxVh:ppcrR65YObqvQSpxv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OEsAgsgs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation OEsAgsgs.exe -
Executes dropped EXE 2 IoCs
Processes:
DIwMsMIA.exeOEsAgsgs.exepid process 4292 DIwMsMIA.exe 4624 OEsAgsgs.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeOEsAgsgs.exeDIwMsMIA.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OEsAgsgs.exe = "C:\\ProgramData\\VcYwMcsE\\OEsAgsgs.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OEsAgsgs.exe = "C:\\ProgramData\\VcYwMcsE\\OEsAgsgs.exe" OEsAgsgs.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DIwMsMIA.exe = "C:\\Users\\Admin\\HcUAQwkY\\DIwMsMIA.exe" DIwMsMIA.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EqIcsAoM.exe = "C:\\Users\\Admin\\sGkYkgcw\\EqIcsAoM.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lawQAkkM.exe = "C:\\ProgramData\\XOYIggoU\\lawQAkkM.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DIwMsMIA.exe = "C:\\Users\\Admin\\HcUAQwkY\\DIwMsMIA.exe" 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe -
Drops file in System32 directory 2 IoCs
Processes:
OEsAgsgs.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe OEsAgsgs.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe OEsAgsgs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4960 1492 WerFault.exe lawQAkkM.exe 3192 3436 WerFault.exe EqIcsAoM.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cscript.execmd.execmd.execmd.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.execmd.execscript.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execscript.execscript.exereg.execscript.execmd.execscript.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.execscript.execmd.execscript.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.execmd.execscript.execmd.exereg.execscript.execmd.exereg.exereg.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exereg.exereg.exereg.exereg.exereg.execscript.execscript.exereg.execscript.exereg.execscript.execmd.exereg.exereg.exereg.exereg.exereg.exereg.execmd.execscript.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1604 reg.exe 4024 reg.exe 3096 reg.exe 3680 reg.exe 1016 reg.exe 2052 reg.exe 4404 reg.exe 2936 reg.exe 5024 reg.exe 4356 reg.exe 4416 reg.exe 1924 reg.exe 4588 reg.exe 2732 reg.exe 3436 reg.exe 1140 reg.exe 780 reg.exe 3652 reg.exe 3304 reg.exe 3016 reg.exe 1304 reg.exe 2008 reg.exe 3440 reg.exe 876 reg.exe 3088 reg.exe 1584 reg.exe 3628 reg.exe 2396 reg.exe 2200 reg.exe 1780 reg.exe 3592 reg.exe 3628 reg.exe 2064 reg.exe 1492 reg.exe 3036 reg.exe 4140 reg.exe 3148 reg.exe 3456 reg.exe 3504 reg.exe 4488 reg.exe 208 reg.exe 1604 reg.exe 2780 reg.exe 4512 reg.exe 2004 reg.exe 3264 reg.exe 4388 reg.exe 3904 reg.exe 5060 reg.exe 5100 reg.exe 3812 reg.exe 216 reg.exe 740 reg.exe 4792 reg.exe 3148 reg.exe 1728 reg.exe 3584 reg.exe 4064 reg.exe 2056 reg.exe 2280 reg.exe 4220 reg.exe 3588 reg.exe 2984 reg.exe 2964 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exepid process 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4632 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4632 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4632 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4632 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4972 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4972 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4972 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4972 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1808 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1808 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1808 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1808 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4548 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4548 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4548 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4548 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1376 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1376 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1376 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1376 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4064 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4064 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4064 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4064 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1752 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1752 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1752 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1752 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1380 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1380 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1380 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1380 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1624 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1624 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1624 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1624 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1448 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1448 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1448 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 1448 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3884 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3884 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3884 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 3884 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 5060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 5060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 5060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 5060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4960 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4960 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4960 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe 4960 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OEsAgsgs.exepid process 4624 OEsAgsgs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
OEsAgsgs.exepid process 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe 4624 OEsAgsgs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.execmd.exe2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.execmd.exedescription pid process target process PID 3904 wrote to memory of 4292 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe DIwMsMIA.exe PID 3904 wrote to memory of 4292 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe DIwMsMIA.exe PID 3904 wrote to memory of 4292 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe DIwMsMIA.exe PID 3904 wrote to memory of 4624 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe OEsAgsgs.exe PID 3904 wrote to memory of 4624 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe OEsAgsgs.exe PID 3904 wrote to memory of 4624 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe OEsAgsgs.exe PID 3904 wrote to memory of 2000 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3904 wrote to memory of 2000 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3904 wrote to memory of 2000 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3904 wrote to memory of 2936 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 2936 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 2936 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3884 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3884 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3884 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3652 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3652 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3652 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 3904 wrote to memory of 3596 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3904 wrote to memory of 3596 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3904 wrote to memory of 3596 3904 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 2000 wrote to memory of 4060 2000 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2000 wrote to memory of 4060 2000 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 2000 wrote to memory of 4060 2000 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 3596 wrote to memory of 2832 3596 cmd.exe cscript.exe PID 3596 wrote to memory of 2832 3596 cmd.exe cscript.exe PID 3596 wrote to memory of 2832 3596 cmd.exe cscript.exe PID 4060 wrote to memory of 4552 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 4060 wrote to memory of 4552 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 4060 wrote to memory of 4552 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 4552 wrote to memory of 212 4552 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 4552 wrote to memory of 212 4552 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 4552 wrote to memory of 212 4552 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 4060 wrote to memory of 1924 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 1924 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 1924 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 3036 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 3036 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 3036 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 780 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 780 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 780 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 4060 wrote to memory of 220 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 4060 wrote to memory of 220 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 4060 wrote to memory of 220 4060 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 220 wrote to memory of 4864 220 cmd.exe cscript.exe PID 220 wrote to memory of 4864 220 cmd.exe cscript.exe PID 220 wrote to memory of 4864 220 cmd.exe cscript.exe PID 212 wrote to memory of 3556 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 212 wrote to memory of 3556 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 212 wrote to memory of 3556 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe PID 3556 wrote to memory of 4632 3556 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 3556 wrote to memory of 4632 3556 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 3556 wrote to memory of 4632 3556 cmd.exe 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe PID 212 wrote to memory of 3628 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 3628 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 3628 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 1616 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 1616 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 1616 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 5060 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 5060 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 5060 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe reg.exe PID 212 wrote to memory of 4640 212 2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\HcUAQwkY\DIwMsMIA.exe"C:\Users\Admin\HcUAQwkY\DIwMsMIA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4292
-
-
C:\ProgramData\VcYwMcsE\OEsAgsgs.exe"C:\ProgramData\VcYwMcsE\OEsAgsgs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"8⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"10⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"12⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"14⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"16⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"18⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"20⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"22⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"24⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"26⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"28⤵
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"30⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"32⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock33⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"34⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock35⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"36⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock37⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"38⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock39⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"40⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock41⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"42⤵PID:1208
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock43⤵PID:2112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"44⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock45⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"46⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock47⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"48⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock49⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"50⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock51⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"52⤵PID:3020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock53⤵PID:2044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"54⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock55⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"56⤵
- System Location Discovery: System Language Discovery
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock57⤵
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"58⤵PID:2880
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock59⤵PID:380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"60⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock61⤵PID:904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"62⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock63⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"64⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock65⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"66⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock67⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"68⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock69⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"70⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock71⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"72⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock73⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"74⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock75⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"76⤵
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock77⤵
- Adds Run key to start application
PID:4024 -
C:\Users\Admin\sGkYkgcw\EqIcsAoM.exe"C:\Users\Admin\sGkYkgcw\EqIcsAoM.exe"78⤵PID:3436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 22479⤵
- Program crash
PID:3192
-
-
-
C:\ProgramData\XOYIggoU\lawQAkkM.exe"C:\ProgramData\XOYIggoU\lawQAkkM.exe"78⤵PID:1492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 22479⤵
- Program crash
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"78⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock79⤵PID:3156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"80⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock81⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"82⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock83⤵PID:3524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"84⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock85⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"86⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock87⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"88⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock89⤵PID:1540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"90⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock91⤵
- System Location Discovery: System Language Discovery
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"92⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock93⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"94⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock95⤵PID:876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"96⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock97⤵PID:4852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"98⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock99⤵PID:2380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"100⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock101⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"102⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock103⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"104⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock105⤵PID:3904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"106⤵
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock107⤵PID:408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"108⤵PID:3332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock109⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"110⤵PID:4364
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock111⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"112⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock113⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"114⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock115⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"116⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock117⤵
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"118⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock119⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"120⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock121⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_4deb641355a2ced75885248619e7e7c8_virlock"122⤵PID:1888
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-