Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 02:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe
-
Size
121KB
-
MD5
0ca1478489d45ef50ea00cc65e30f283
-
SHA1
ac3541c33fb0769655b4e3e475d4381b140ba37c
-
SHA256
f4364fae133e48bde2659e5903e133371af5e97b3cc3f84a9671a79187a7d42e
-
SHA512
fd88962164d83e0f23a49cdf54e914b7d613075a5289c94bafb5e5616b8ebcea048357281a6e37f4233d148295080915f01f66ab8a5b90f99d443b07f5292c0b
-
SSDEEP
3072:uAoxPqClJjfiPW1z12uNe+HA/40UugLSckJwd:3oxPpdz12uNS4eaSckJwd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation quwQocsk.exe -
Deletes itself 1 IoCs
pid Process 592 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2448 quwQocsk.exe 2404 nWQQwQAU.exe -
Loads dropped DLL 20 IoCs
pid Process 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nWQQwQAU.exe = "C:\\ProgramData\\bGMAYEgk\\nWQQwQAU.exe" nWQQwQAU.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\mqQEIMcE.exe = "C:\\Users\\Admin\\ZuMcgkMg\\mqQEIMcE.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yocEcAwI.exe = "C:\\ProgramData\\xqkcUsAM\\yocEcAwI.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\quwQocsk.exe = "C:\\Users\\Admin\\hCcIIcQM\\quwQocsk.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nWQQwQAU.exe = "C:\\ProgramData\\bGMAYEgk\\nWQQwQAU.exe" 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\quwQocsk.exe = "C:\\Users\\Admin\\hCcIIcQM\\quwQocsk.exe" quwQocsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2828 2688 WerFault.exe 346 2412 928 WerFault.exe 345 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yocEcAwI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2728 reg.exe 1640 reg.exe 3028 reg.exe 1948 reg.exe 2160 reg.exe 2124 reg.exe 1856 reg.exe 1408 reg.exe 1600 reg.exe 708 reg.exe 1640 reg.exe 3068 reg.exe 2724 reg.exe 2368 reg.exe 1772 reg.exe 2036 reg.exe 2068 reg.exe 2672 reg.exe 2664 reg.exe 2608 reg.exe 2176 reg.exe 2168 reg.exe 2636 reg.exe 3004 reg.exe 2372 reg.exe 916 reg.exe 672 reg.exe 1156 reg.exe 2724 reg.exe 2328 reg.exe 2584 reg.exe 2244 reg.exe 2412 reg.exe 2464 reg.exe 2516 reg.exe 2304 reg.exe 1492 reg.exe 592 reg.exe 2596 reg.exe 1728 reg.exe 344 reg.exe 2384 reg.exe 320 reg.exe 2344 reg.exe 1416 reg.exe 1312 reg.exe 2472 reg.exe 2700 reg.exe 3000 reg.exe 2784 reg.exe 1920 reg.exe 2796 reg.exe 2520 reg.exe 2932 reg.exe 3000 reg.exe 1540 reg.exe 644 reg.exe 960 reg.exe 2628 reg.exe 784 reg.exe 2684 reg.exe 2128 reg.exe 2688 reg.exe 784 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2720 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2720 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1948 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1948 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1144 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1144 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 788 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 788 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2304 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2304 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1284 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1284 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2240 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2240 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2644 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2644 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2128 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2128 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1780 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1780 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2508 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2508 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1244 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1244 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1284 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1284 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2164 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2164 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2988 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2988 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2924 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2924 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2820 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2820 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2732 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2732 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2332 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2332 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2800 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2800 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1704 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1704 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1360 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1360 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1684 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1684 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 968 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 968 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2820 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2820 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2244 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2244 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3000 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 3000 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2644 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2644 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1500 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 1500 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2876 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 2876 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2448 quwQocsk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe 2448 quwQocsk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2448 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 30 PID 1928 wrote to memory of 2448 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 30 PID 1928 wrote to memory of 2448 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 30 PID 1928 wrote to memory of 2448 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 30 PID 1928 wrote to memory of 2404 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 31 PID 1928 wrote to memory of 2404 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 31 PID 1928 wrote to memory of 2404 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 31 PID 1928 wrote to memory of 2404 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 31 PID 1928 wrote to memory of 2124 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 32 PID 1928 wrote to memory of 2124 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 32 PID 1928 wrote to memory of 2124 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 32 PID 1928 wrote to memory of 2124 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 32 PID 1928 wrote to memory of 2456 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 34 PID 1928 wrote to memory of 2456 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 34 PID 1928 wrote to memory of 2456 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 34 PID 1928 wrote to memory of 2456 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 34 PID 1928 wrote to memory of 2740 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 35 PID 1928 wrote to memory of 2740 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 35 PID 1928 wrote to memory of 2740 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 35 PID 1928 wrote to memory of 2740 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 35 PID 1928 wrote to memory of 2728 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 36 PID 1928 wrote to memory of 2728 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 36 PID 1928 wrote to memory of 2728 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 36 PID 1928 wrote to memory of 2728 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 36 PID 1928 wrote to memory of 2876 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 37 PID 1928 wrote to memory of 2876 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 37 PID 1928 wrote to memory of 2876 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 37 PID 1928 wrote to memory of 2876 1928 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 37 PID 2124 wrote to memory of 2756 2124 cmd.exe 39 PID 2124 wrote to memory of 2756 2124 cmd.exe 39 PID 2124 wrote to memory of 2756 2124 cmd.exe 39 PID 2124 wrote to memory of 2756 2124 cmd.exe 39 PID 2876 wrote to memory of 2192 2876 cmd.exe 43 PID 2876 wrote to memory of 2192 2876 cmd.exe 43 PID 2876 wrote to memory of 2192 2876 cmd.exe 43 PID 2876 wrote to memory of 2192 2876 cmd.exe 43 PID 2756 wrote to memory of 2632 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 44 PID 2756 wrote to memory of 2632 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 44 PID 2756 wrote to memory of 2632 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 44 PID 2756 wrote to memory of 2632 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 44 PID 2632 wrote to memory of 2720 2632 cmd.exe 46 PID 2632 wrote to memory of 2720 2632 cmd.exe 46 PID 2632 wrote to memory of 2720 2632 cmd.exe 46 PID 2632 wrote to memory of 2720 2632 cmd.exe 46 PID 2756 wrote to memory of 2908 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 47 PID 2756 wrote to memory of 2908 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 47 PID 2756 wrote to memory of 2908 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 47 PID 2756 wrote to memory of 2908 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 47 PID 2756 wrote to memory of 1996 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 48 PID 2756 wrote to memory of 1996 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 48 PID 2756 wrote to memory of 1996 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 48 PID 2756 wrote to memory of 1996 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 48 PID 2756 wrote to memory of 2464 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 49 PID 2756 wrote to memory of 2464 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 49 PID 2756 wrote to memory of 2464 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 49 PID 2756 wrote to memory of 2464 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 49 PID 2756 wrote to memory of 1136 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 51 PID 2756 wrote to memory of 1136 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 51 PID 2756 wrote to memory of 1136 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 51 PID 2756 wrote to memory of 1136 2756 2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe 51 PID 1136 wrote to memory of 1808 1136 cmd.exe 55 PID 1136 wrote to memory of 1808 1136 cmd.exe 55 PID 1136 wrote to memory of 1808 1136 cmd.exe 55 PID 1136 wrote to memory of 1808 1136 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\hCcIIcQM\quwQocsk.exe"C:\Users\Admin\hCcIIcQM\quwQocsk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2448
-
-
C:\ProgramData\bGMAYEgk\nWQQwQAU.exe"C:\ProgramData\bGMAYEgk\nWQQwQAU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2404
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"6⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"8⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"10⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"12⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"14⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock15⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"16⤵
- System Location Discovery: System Language Discovery
PID:688 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"18⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"20⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"22⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"24⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"26⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock27⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"28⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"30⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"32⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"34⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"36⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"38⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"40⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"42⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock43⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"44⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock45⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"46⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"48⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"50⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"52⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock53⤵
- Adds Run key to start application
PID:1324 -
C:\Users\Admin\ZuMcgkMg\mqQEIMcE.exe"C:\Users\Admin\ZuMcgkMg\mqQEIMcE.exe"54⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 3655⤵
- Program crash
PID:2412
-
-
-
C:\ProgramData\xqkcUsAM\yocEcAwI.exe"C:\ProgramData\xqkcUsAM\yocEcAwI.exe"54⤵
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 3655⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"54⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"56⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"58⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"60⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"62⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"64⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock65⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"66⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock67⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"68⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock69⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"70⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock71⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"72⤵
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock73⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"74⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock75⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"76⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock77⤵PID:1896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"78⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock79⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"80⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock81⤵PID:3008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"82⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock83⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"84⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock85⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"86⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock87⤵PID:2524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"88⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock89⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"90⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock91⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"92⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock93⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"94⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock95⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"96⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock97⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"98⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock99⤵PID:2016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"100⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock101⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"102⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock103⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"104⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock105⤵PID:1804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"106⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock107⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"108⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock109⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"110⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock111⤵PID:1156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"112⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock113⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"114⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock115⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"116⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock117⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"118⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock119⤵PID:964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"120⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock121⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_0ca1478489d45ef50ea00cc65e30f283_virlock"122⤵PID:2616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-