Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe
-
Size
241KB
-
MD5
5c96825d8cd6c41c6d564ffdf7d1675b
-
SHA1
ed2f9aaa37356cbf0fdb1370d8d580f12e487960
-
SHA256
6cf802b773edcd7a7da9dcdeeb36fb2b3209bb616d29010fe90153b0595e2ec4
-
SHA512
6b2b5187aff8a90a9f48924bb40cc660e1b1207def30e5902172a883fdb49ed0b08e180bd4d239752190c1f7af010c2c6eb6afe417768b46c481424fe5771a26
-
SSDEEP
6144:sh6vAzJiHk5fTX2pGdq2EqkBTnY4zNDfLGrsOiFo/kYRd:sVkH2Da72SK4ZLK/6Kd
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mmcUccok.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mmcUccok.exe -
Executes dropped EXE 2 IoCs
Processes:
EgUEQgkM.exemmcUccok.exepid Process 4544 EgUEQgkM.exe 1460 mmcUccok.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeEgUEQgkM.exemmcUccok.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EgUEQgkM.exe = "C:\\Users\\Admin\\BggwgYoU\\EgUEQgkM.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mmcUccok.exe = "C:\\ProgramData\\ZmkIkwwQ\\mmcUccok.exe" 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\EgUEQgkM.exe = "C:\\Users\\Admin\\BggwgYoU\\EgUEQgkM.exe" EgUEQgkM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mmcUccok.exe = "C:\\ProgramData\\ZmkIkwwQ\\mmcUccok.exe" mmcUccok.exe -
Drops file in System32 directory 2 IoCs
Processes:
mmcUccok.exedescription ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe mmcUccok.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe mmcUccok.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exereg.execscript.exereg.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execscript.execmd.exereg.exereg.exereg.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exereg.execmd.exereg.execmd.execscript.execmd.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execmd.execmd.execmd.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exereg.exereg.execscript.exereg.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execmd.exereg.exereg.execmd.exereg.exereg.execmd.execmd.execmd.execmd.execmd.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exereg.exereg.exereg.exereg.exereg.execmd.execmd.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exereg.execscript.execscript.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execscript.exereg.exereg.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execscript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid Process 4436 reg.exe 4468 reg.exe 816 reg.exe 1864 reg.exe 3660 reg.exe 1748 reg.exe 952 reg.exe 3292 reg.exe 4628 reg.exe 4180 reg.exe 696 reg.exe 1872 reg.exe 2980 reg.exe 3576 reg.exe 4180 reg.exe 4264 reg.exe 3308 reg.exe 4312 reg.exe 696 reg.exe 1768 reg.exe 2004 reg.exe 1932 reg.exe 4324 reg.exe 2244 reg.exe 4872 reg.exe 1964 reg.exe 4148 reg.exe 4616 reg.exe 836 reg.exe 2276 reg.exe 4604 reg.exe 640 reg.exe 2180 reg.exe 4968 reg.exe 2556 reg.exe 1472 reg.exe 2160 reg.exe 4296 reg.exe 4996 reg.exe 2536 reg.exe 392 reg.exe 1052 reg.exe 1364 reg.exe 4992 reg.exe 840 reg.exe 4924 reg.exe 3928 reg.exe 2636 reg.exe 3636 reg.exe 3040 reg.exe 1760 reg.exe 4548 reg.exe 3916 reg.exe 3724 reg.exe 2616 reg.exe 8 reg.exe 2972 reg.exe 1864 reg.exe 1396 reg.exe 4392 reg.exe 4992 reg.exe 2288 reg.exe 4680 reg.exe 1616 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exepid Process 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3116 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3116 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3116 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3116 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3788 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3640 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3640 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3640 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3640 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2616 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2616 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2616 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2616 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4288 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4288 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4288 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4288 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 224 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 224 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 224 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 224 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 544 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 544 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 544 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 544 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3700 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3700 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3700 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3700 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 5100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 5100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 5100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 5100 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4676 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2864 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2864 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2864 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 2864 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3472 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3472 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3472 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 3472 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4356 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4356 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4356 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 4356 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mmcUccok.exepid Process 1460 mmcUccok.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
mmcUccok.exepid Process 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe 1460 mmcUccok.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execmd.execmd.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execmd.execmd.exe2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.execmd.exedescription pid Process procid_target PID 3964 wrote to memory of 4544 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 83 PID 3964 wrote to memory of 4544 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 83 PID 3964 wrote to memory of 4544 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 83 PID 3964 wrote to memory of 1460 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 84 PID 3964 wrote to memory of 1460 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 84 PID 3964 wrote to memory of 1460 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 84 PID 3964 wrote to memory of 1568 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 85 PID 3964 wrote to memory of 1568 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 85 PID 3964 wrote to memory of 1568 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 85 PID 3964 wrote to memory of 2212 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 87 PID 3964 wrote to memory of 2212 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 87 PID 3964 wrote to memory of 2212 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 87 PID 3964 wrote to memory of 3516 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 88 PID 3964 wrote to memory of 3516 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 88 PID 3964 wrote to memory of 3516 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 88 PID 3964 wrote to memory of 1820 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 89 PID 3964 wrote to memory of 1820 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 89 PID 3964 wrote to memory of 1820 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 89 PID 1568 wrote to memory of 2040 1568 cmd.exe 90 PID 1568 wrote to memory of 2040 1568 cmd.exe 90 PID 1568 wrote to memory of 2040 1568 cmd.exe 90 PID 3964 wrote to memory of 3920 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 91 PID 3964 wrote to memory of 3920 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 91 PID 3964 wrote to memory of 3920 3964 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 91 PID 3920 wrote to memory of 2864 3920 cmd.exe 96 PID 3920 wrote to memory of 2864 3920 cmd.exe 96 PID 3920 wrote to memory of 2864 3920 cmd.exe 96 PID 2040 wrote to memory of 5108 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 97 PID 2040 wrote to memory of 5108 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 97 PID 2040 wrote to memory of 5108 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 97 PID 5108 wrote to memory of 264 5108 cmd.exe 99 PID 5108 wrote to memory of 264 5108 cmd.exe 99 PID 5108 wrote to memory of 264 5108 cmd.exe 99 PID 2040 wrote to memory of 1736 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 100 PID 2040 wrote to memory of 1736 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 100 PID 2040 wrote to memory of 1736 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 100 PID 2040 wrote to memory of 3684 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 101 PID 2040 wrote to memory of 3684 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 101 PID 2040 wrote to memory of 3684 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 101 PID 2040 wrote to memory of 696 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 102 PID 2040 wrote to memory of 696 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 102 PID 2040 wrote to memory of 696 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 102 PID 2040 wrote to memory of 3360 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 103 PID 2040 wrote to memory of 3360 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 103 PID 2040 wrote to memory of 3360 2040 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 103 PID 3360 wrote to memory of 208 3360 cmd.exe 108 PID 3360 wrote to memory of 208 3360 cmd.exe 108 PID 3360 wrote to memory of 208 3360 cmd.exe 108 PID 264 wrote to memory of 2460 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 109 PID 264 wrote to memory of 2460 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 109 PID 264 wrote to memory of 2460 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 109 PID 2460 wrote to memory of 3116 2460 cmd.exe 111 PID 2460 wrote to memory of 3116 2460 cmd.exe 111 PID 2460 wrote to memory of 3116 2460 cmd.exe 111 PID 264 wrote to memory of 3404 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 112 PID 264 wrote to memory of 3404 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 112 PID 264 wrote to memory of 3404 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 112 PID 264 wrote to memory of 8 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 113 PID 264 wrote to memory of 8 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 113 PID 264 wrote to memory of 8 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 113 PID 264 wrote to memory of 5028 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 114 PID 264 wrote to memory of 5028 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 114 PID 264 wrote to memory of 5028 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 114 PID 264 wrote to memory of 4728 264 2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\BggwgYoU\EgUEQgkM.exe"C:\Users\Admin\BggwgYoU\EgUEQgkM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4544
-
-
C:\ProgramData\ZmkIkwwQ\mmcUccok.exe"C:\ProgramData\ZmkIkwwQ\mmcUccok.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1460
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"8⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"10⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock11⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"12⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"14⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"16⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"18⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"20⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"22⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"24⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock25⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"26⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"28⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"30⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"32⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock33⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"34⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock35⤵
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"36⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock37⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"38⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock39⤵PID:3360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"40⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock41⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"42⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock43⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"44⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock45⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"46⤵PID:1216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock47⤵PID:3516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"48⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock49⤵PID:3144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"50⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock51⤵PID:2764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"52⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock53⤵
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"54⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock55⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"56⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock57⤵
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"58⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock59⤵PID:1676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"60⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock61⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"62⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock63⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"64⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock65⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"66⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock67⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"68⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock69⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"70⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock71⤵PID:4188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"72⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock73⤵PID:1108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"74⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock75⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"76⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock77⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"78⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock79⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"80⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock81⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"82⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock83⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"84⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock85⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"86⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock87⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"88⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock89⤵PID:2460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"90⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock91⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"92⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock93⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"94⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock95⤵PID:1820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"96⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock97⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"98⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock99⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"100⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock101⤵PID:4540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"102⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock103⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"104⤵PID:3696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:3676
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock105⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"106⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock107⤵PID:836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"108⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock109⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"110⤵PID:332
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock111⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"112⤵PID:2724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock113⤵PID:264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"114⤵
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock115⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"116⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock117⤵PID:900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"118⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock119⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"120⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock121⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_5c96825d8cd6c41c6d564ffdf7d1675b_virlock"122⤵PID:4988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-