Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
-
Size
121KB
-
MD5
0ca1478489d45ef50ea00cc65e30f283
-
SHA1
ac3541c33fb0769655b4e3e475d4381b140ba37c
-
SHA256
f4364fae133e48bde2659e5903e133371af5e97b3cc3f84a9671a79187a7d42e
-
SHA512
fd88962164d83e0f23a49cdf54e914b7d613075a5289c94bafb5e5616b8ebcea048357281a6e37f4233d148295080915f01f66ab8a5b90f99d443b07f5292c0b
-
SSDEEP
3072:uAoxPqClJjfiPW1z12uNe+HA/40UugLSckJwd:3oxPpdz12uNS4eaSckJwd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OWoUMowY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation OWoUMowY.exe -
Executes dropped EXE 2 IoCs
Processes:
UIcwwQwk.exeOWoUMowY.exepid process 3692 UIcwwQwk.exe 2360 OWoUMowY.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
OWoUMowY.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeUIcwwQwk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OWoUMowY.exe = "C:\\ProgramData\\MUsQYcEQ\\OWoUMowY.exe" OWoUMowY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UIcwwQwk.exe = "C:\\Users\\Admin\\hksgYEYM\\UIcwwQwk.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\OWoUMowY.exe = "C:\\ProgramData\\MUsQYcEQ\\OWoUMowY.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\UIcwwQwk.exe = "C:\\Users\\Admin\\hksgYEYM\\UIcwwQwk.exe" UIcwwQwk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
reg.execmd.exereg.execmd.exereg.execmd.execmd.exereg.execmd.execmd.exereg.exeUIcwwQwk.exereg.exereg.execmd.exereg.execmd.execmd.execmd.execmd.execmd.execmd.exereg.execmd.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exereg.exereg.exereg.exereg.execmd.execmd.execscript.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.execscript.execscript.exereg.exereg.execmd.exereg.execmd.exereg.exereg.exereg.exereg.execmd.execmd.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exereg.exereg.execscript.exereg.exereg.exereg.exereg.exereg.exereg.execmd.execscript.exereg.execmd.execmd.execscript.execscript.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UIcwwQwk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2828 reg.exe 3180 reg.exe 4384 reg.exe 3612 reg.exe 4536 reg.exe 2668 reg.exe 760 reg.exe 4432 reg.exe 328 reg.exe 1916 reg.exe 3088 reg.exe 636 reg.exe 5064 reg.exe 3616 reg.exe 4620 reg.exe 1768 reg.exe 1164 reg.exe 3224 reg.exe 4984 reg.exe 3408 reg.exe 1576 reg.exe 3860 reg.exe 832 reg.exe 3572 reg.exe 3680 reg.exe 2008 reg.exe 116 reg.exe 4024 reg.exe 2432 reg.exe 3464 reg.exe 180 reg.exe 932 reg.exe 1864 reg.exe 4760 reg.exe 2204 reg.exe 2132 reg.exe 1116 reg.exe 3868 reg.exe 1132 reg.exe 1956 reg.exe 1364 reg.exe 1732 reg.exe 3040 reg.exe 3244 reg.exe 1312 reg.exe 4156 reg.exe 1956 reg.exe 1088 reg.exe 2092 reg.exe 2208 reg.exe 2168 reg.exe 3180 reg.exe 1220 reg.exe 3748 reg.exe 3840 reg.exe 1180 reg.exe 1464 reg.exe 1480 reg.exe 2384 reg.exe 1092 reg.exe 5024 reg.exe 2708 reg.exe 4224 reg.exe 1424 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exepid process 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3236 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3236 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3236 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3236 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3032 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3032 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3032 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3032 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3184 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3184 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3184 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3184 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2124 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2124 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2124 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2124 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1260 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1260 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1260 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1260 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4024 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4024 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4024 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4024 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4092 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4092 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4092 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4092 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4432 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4432 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4432 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4432 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 100 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 100 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 100 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 100 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4712 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4712 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4712 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 4712 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3992 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3992 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3992 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3992 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2196 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2196 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2196 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2196 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3064 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3064 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3064 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3064 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OWoUMowY.exepid process 2360 OWoUMowY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
OWoUMowY.exepid process 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe 2360 OWoUMowY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.execmd.execmd.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.execmd.execmd.exe2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.execmd.exedescription pid process target process PID 3396 wrote to memory of 3692 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe UIcwwQwk.exe PID 3396 wrote to memory of 3692 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe UIcwwQwk.exe PID 3396 wrote to memory of 3692 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe UIcwwQwk.exe PID 3396 wrote to memory of 2360 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe OWoUMowY.exe PID 3396 wrote to memory of 2360 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe OWoUMowY.exe PID 3396 wrote to memory of 2360 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe OWoUMowY.exe PID 3396 wrote to memory of 4384 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3396 wrote to memory of 4384 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3396 wrote to memory of 4384 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3396 wrote to memory of 1364 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 1364 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 1364 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 1576 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 1576 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 1576 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 2584 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 2584 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 2584 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 3396 wrote to memory of 4936 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3396 wrote to memory of 4936 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3396 wrote to memory of 4936 3396 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4384 wrote to memory of 4420 4384 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4384 wrote to memory of 4420 4384 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4384 wrote to memory of 4420 4384 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4936 wrote to memory of 1716 4936 cmd.exe cscript.exe PID 4936 wrote to memory of 1716 4936 cmd.exe cscript.exe PID 4936 wrote to memory of 1716 4936 cmd.exe cscript.exe PID 4420 wrote to memory of 4112 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4420 wrote to memory of 4112 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4420 wrote to memory of 4112 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4112 wrote to memory of 2624 4112 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4112 wrote to memory of 2624 4112 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4112 wrote to memory of 2624 4112 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 4420 wrote to memory of 4812 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 4812 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 4812 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 1912 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 1912 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 1912 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 5052 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 5052 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 5052 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 4420 wrote to memory of 3680 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4420 wrote to memory of 3680 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 4420 wrote to memory of 3680 4420 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 3680 wrote to memory of 3428 3680 cmd.exe cscript.exe PID 3680 wrote to memory of 3428 3680 cmd.exe cscript.exe PID 3680 wrote to memory of 3428 3680 cmd.exe cscript.exe PID 2624 wrote to memory of 60 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 2624 wrote to memory of 60 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 2624 wrote to memory of 60 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe PID 2624 wrote to memory of 220 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 220 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 220 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 60 wrote to memory of 3236 60 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 60 wrote to memory of 3236 60 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 60 wrote to memory of 3236 60 cmd.exe 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe PID 2624 wrote to memory of 2092 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 2092 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 2092 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 328 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 328 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 328 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe reg.exe PID 2624 wrote to memory of 1996 2624 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\hksgYEYM\UIcwwQwk.exe"C:\Users\Admin\hksgYEYM\UIcwwQwk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\ProgramData\MUsQYcEQ\OWoUMowY.exe"C:\ProgramData\MUsQYcEQ\OWoUMowY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"8⤵
- System Location Discovery: System Language Discovery
PID:744 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"10⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"12⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"14⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"16⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"18⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock19⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"20⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"22⤵PID:212
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"24⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"26⤵PID:532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"28⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"30⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"32⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock33⤵PID:1696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"34⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock35⤵
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"36⤵PID:3804
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock37⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"38⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock39⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"40⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock41⤵PID:1208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"42⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock43⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"44⤵
- System Location Discovery: System Language Discovery
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock45⤵PID:3464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"46⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock47⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"48⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock49⤵PID:4952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"50⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock51⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"52⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock53⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"54⤵PID:4768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:3616
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock55⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"56⤵PID:4624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock57⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"58⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock59⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"60⤵
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock61⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"62⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock63⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"64⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock65⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"66⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock67⤵PID:3252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"68⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock69⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"70⤵PID:5080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock71⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"72⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock73⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"74⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock75⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"76⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock77⤵PID:1184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"78⤵
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock79⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"80⤵PID:1568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:1444
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock81⤵PID:1564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"82⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock83⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"84⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock85⤵PID:4208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"86⤵PID:116
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock87⤵PID:4788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"88⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock89⤵PID:4012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"90⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock91⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"92⤵PID:180
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock93⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"94⤵PID:760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock95⤵PID:3020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"96⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock97⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"98⤵PID:1700
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock99⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"100⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock101⤵PID:3812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"102⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock103⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"104⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock105⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"106⤵
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock107⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"108⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock109⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"110⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock111⤵PID:5112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"112⤵PID:1808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock113⤵PID:3920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"114⤵PID:2472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock115⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"116⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock117⤵PID:2136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"118⤵
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock119⤵PID:1472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"120⤵PID:4788
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:932
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock121⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"122⤵PID:4560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-