Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
-
Size
241KB
-
MD5
5c96825d8cd6c41c6d564ffdf7d1675b
-
SHA1
ed2f9aaa37356cbf0fdb1370d8d580f12e487960
-
SHA256
6cf802b773edcd7a7da9dcdeeb36fb2b3209bb616d29010fe90153b0595e2ec4
-
SHA512
6b2b5187aff8a90a9f48924bb40cc660e1b1207def30e5902172a883fdb49ed0b08e180bd4d239752190c1f7af010c2c6eb6afe417768b46c481424fe5771a26
-
SSDEEP
6144:sh6vAzJiHk5fTX2pGdq2EqkBTnY4zNDfLGrsOiFo/kYRd:sVkH2Da72SK4ZLK/6Kd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Control Panel\International\Geo\Nation iMEggEYQ.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 EeoMscAU.exe 2680 iMEggEYQ.exe -
Loads dropped DLL 20 IoCs
pid Process 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\wegooQMI.exe = "C:\\Users\\Admin\\cmcEsMko\\wegooQMI.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\UysokEgY.exe = "C:\\ProgramData\\YYEMkoMU\\UysokEgY.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\EeoMscAU.exe = "C:\\Users\\Admin\\JUIAQcgk\\EeoMscAU.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iMEggEYQ.exe = "C:\\ProgramData\\ACYgMowg\\iMEggEYQ.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iMEggEYQ.exe = "C:\\ProgramData\\ACYgMowg\\iMEggEYQ.exe" iMEggEYQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\EeoMscAU.exe = "C:\\Users\\Admin\\JUIAQcgk\\EeoMscAU.exe" EeoMscAU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2524 900 WerFault.exe 246 2484 2252 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2652 reg.exe 2436 reg.exe 2184 reg.exe 1732 reg.exe 264 reg.exe 1928 reg.exe 1708 reg.exe 1036 reg.exe 2284 reg.exe 2644 reg.exe 536 reg.exe 1992 reg.exe 708 reg.exe 1544 reg.exe 2348 reg.exe 1996 reg.exe 1908 reg.exe 2280 reg.exe 2648 reg.exe 2660 reg.exe 1896 reg.exe 3028 reg.exe 2184 reg.exe 468 reg.exe 2068 reg.exe 2104 reg.exe 2092 reg.exe 2144 reg.exe 1960 reg.exe 1484 reg.exe 2816 reg.exe 1992 reg.exe 2528 reg.exe 2796 reg.exe 2644 reg.exe 2676 reg.exe 2064 reg.exe 1700 reg.exe 2724 reg.exe 1744 reg.exe 2632 reg.exe 1556 reg.exe 884 reg.exe 1924 reg.exe 1748 reg.exe 2444 reg.exe 536 reg.exe 2420 reg.exe 2152 reg.exe 1896 reg.exe 884 reg.exe 1608 reg.exe 1928 reg.exe 2652 reg.exe 1528 reg.exe 1436 reg.exe 1416 reg.exe 1748 reg.exe 2256 reg.exe 2636 reg.exe 1712 reg.exe 1940 reg.exe 340 reg.exe 1476 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 604 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 604 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2104 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2104 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1204 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1204 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2416 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2416 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2720 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2720 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2916 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2916 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1680 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1680 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2068 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2068 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2208 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2208 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1888 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1888 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2696 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2696 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2748 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2748 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2440 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2440 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1896 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1896 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2076 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2076 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2396 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2396 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1848 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1848 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1880 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1880 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 468 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 468 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2568 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2568 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1772 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1772 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2612 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2612 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 572 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 572 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2384 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2384 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1880 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 1880 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2620 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2620 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 iMEggEYQ.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe 2680 iMEggEYQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3040 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 28 PID 2080 wrote to memory of 3040 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 28 PID 2080 wrote to memory of 3040 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 28 PID 2080 wrote to memory of 3040 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 28 PID 2080 wrote to memory of 2680 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 29 PID 2080 wrote to memory of 2680 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 29 PID 2080 wrote to memory of 2680 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 29 PID 2080 wrote to memory of 2680 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 29 PID 2080 wrote to memory of 2464 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 30 PID 2080 wrote to memory of 2464 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 30 PID 2080 wrote to memory of 2464 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 30 PID 2080 wrote to memory of 2464 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 30 PID 2464 wrote to memory of 2832 2464 cmd.exe 32 PID 2464 wrote to memory of 2832 2464 cmd.exe 32 PID 2464 wrote to memory of 2832 2464 cmd.exe 32 PID 2464 wrote to memory of 2832 2464 cmd.exe 32 PID 2080 wrote to memory of 2648 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 33 PID 2080 wrote to memory of 2648 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 33 PID 2080 wrote to memory of 2648 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 33 PID 2080 wrote to memory of 2648 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 33 PID 2080 wrote to memory of 2424 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 34 PID 2080 wrote to memory of 2424 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 34 PID 2080 wrote to memory of 2424 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 34 PID 2080 wrote to memory of 2424 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 34 PID 2080 wrote to memory of 2484 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 36 PID 2080 wrote to memory of 2484 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 36 PID 2080 wrote to memory of 2484 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 36 PID 2080 wrote to memory of 2484 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 36 PID 2080 wrote to memory of 2652 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 38 PID 2080 wrote to memory of 2652 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 38 PID 2080 wrote to memory of 2652 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 38 PID 2080 wrote to memory of 2652 2080 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 38 PID 2652 wrote to memory of 2580 2652 cmd.exe 41 PID 2652 wrote to memory of 2580 2652 cmd.exe 41 PID 2652 wrote to memory of 2580 2652 cmd.exe 41 PID 2652 wrote to memory of 2580 2652 cmd.exe 41 PID 2832 wrote to memory of 484 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 42 PID 2832 wrote to memory of 484 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 42 PID 2832 wrote to memory of 484 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 42 PID 2832 wrote to memory of 484 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 42 PID 484 wrote to memory of 604 484 cmd.exe 44 PID 484 wrote to memory of 604 484 cmd.exe 44 PID 484 wrote to memory of 604 484 cmd.exe 44 PID 484 wrote to memory of 604 484 cmd.exe 44 PID 2832 wrote to memory of 584 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 45 PID 2832 wrote to memory of 584 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 45 PID 2832 wrote to memory of 584 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 45 PID 2832 wrote to memory of 584 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 45 PID 2832 wrote to memory of 1416 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 46 PID 2832 wrote to memory of 1416 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 46 PID 2832 wrote to memory of 1416 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 46 PID 2832 wrote to memory of 1416 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 46 PID 2832 wrote to memory of 2772 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 48 PID 2832 wrote to memory of 2772 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 48 PID 2832 wrote to memory of 2772 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 48 PID 2832 wrote to memory of 2772 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 48 PID 2832 wrote to memory of 2972 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 50 PID 2832 wrote to memory of 2972 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 50 PID 2832 wrote to memory of 2972 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 50 PID 2832 wrote to memory of 2972 2832 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 50 PID 2972 wrote to memory of 2216 2972 cmd.exe 53 PID 2972 wrote to memory of 2216 2972 cmd.exe 53 PID 2972 wrote to memory of 2216 2972 cmd.exe 53 PID 2972 wrote to memory of 2216 2972 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\JUIAQcgk\EeoMscAU.exe"C:\Users\Admin\JUIAQcgk\EeoMscAU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3040
-
-
C:\ProgramData\ACYgMowg\iMEggEYQ.exe"C:\ProgramData\ACYgMowg\iMEggEYQ.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2680
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"6⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"8⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"10⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"12⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"14⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"16⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"18⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"20⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"22⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"24⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"26⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"28⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"30⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"32⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"34⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"36⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock37⤵
- Adds Run key to start application
PID:1652 -
C:\Users\Admin\cmcEsMko\wegooQMI.exe"C:\Users\Admin\cmcEsMko\wegooQMI.exe"38⤵PID:900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 3639⤵
- Program crash
PID:2524
-
-
-
C:\ProgramData\YYEMkoMU\UysokEgY.exe"C:\ProgramData\YYEMkoMU\UysokEgY.exe"38⤵PID:2252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 3639⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"38⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock39⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"40⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"42⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock43⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"44⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"46⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock47⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:788 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"48⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"50⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"52⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"54⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock55⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"56⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"58⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"60⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"62⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"64⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock65⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"66⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock67⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"68⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock69⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"70⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock71⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"72⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock73⤵PID:2392
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"74⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock75⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"76⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock77⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"78⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock79⤵PID:912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"80⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock81⤵PID:3036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"82⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock83⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"84⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock85⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"86⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock87⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"88⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock89⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"90⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock91⤵PID:1436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"92⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock93⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"94⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock95⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"96⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock97⤵PID:1432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"98⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock99⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"100⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock101⤵PID:1728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"102⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock103⤵
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"104⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock105⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"106⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock107⤵PID:1300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"108⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock109⤵PID:1744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"110⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock111⤵PID:1844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"112⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock113⤵PID:332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"114⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock115⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"116⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock117⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"118⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock119⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"120⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock121⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"122⤵PID:708
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-