Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 03:06
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe
-
Size
117KB
-
MD5
9fac3e4225b3aaacbf2a59a2bcffba00
-
SHA1
252caef9b62150eee9a7d83db7d68f7355e62216
-
SHA256
c4ada8628f591a551e8d3eec090bedcab90c9cccaae9e641d8a57e80ab3cc307
-
SHA512
1489fbbf331476dc673791835f921f44f3cb5a2f37fb3762787927e3620a019645df9c9e23f0457b3aee8761966b8eb1d434fe2f718e0c7edabcfb5f44eb2d72
-
SSDEEP
1536:zcUhcQHa9YT9d4tl6xKYfx0CnMOYWzxbZKIM7URtQK2WxnnvV3gwyIDwo:zDLHZd4+KYf6CMOn7YK2SvVwID
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation fcwIccAo.exe -
Executes dropped EXE 2 IoCs
pid Process 4432 LUwMEQoA.exe 2788 fcwIccAo.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LUwMEQoA.exe = "C:\\Users\\Admin\\PIkUYskY\\LUwMEQoA.exe" 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fcwIccAo.exe = "C:\\ProgramData\\KGwYEkMA\\fcwIccAo.exe" 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fcwIccAo.exe = "C:\\ProgramData\\KGwYEkMA\\fcwIccAo.exe" fcwIccAo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LUwMEQoA.exe = "C:\\Users\\Admin\\PIkUYskY\\LUwMEQoA.exe" LUwMEQoA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LUwMEQoA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3060 reg.exe 3568 reg.exe 5060 reg.exe 4996 reg.exe 2672 reg.exe 1988 reg.exe 4500 reg.exe 4248 reg.exe 3696 reg.exe 1604 reg.exe 2948 reg.exe 1492 reg.exe 2532 reg.exe 3160 reg.exe 2536 reg.exe 3156 reg.exe 4824 reg.exe 2492 reg.exe 3004 reg.exe 2044 reg.exe 5024 reg.exe 3100 reg.exe 2112 reg.exe 4060 reg.exe 2764 reg.exe 2916 reg.exe 1416 reg.exe 464 reg.exe 1420 reg.exe 2692 reg.exe 216 reg.exe 3100 reg.exe 3124 reg.exe 2456 reg.exe 3680 reg.exe 3040 reg.exe 4436 reg.exe 1420 reg.exe 1212 reg.exe 3000 reg.exe 1124 reg.exe 4052 reg.exe 4220 reg.exe 3956 reg.exe 5104 reg.exe 1324 reg.exe 2172 reg.exe 3128 reg.exe 4856 reg.exe 964 reg.exe 4816 reg.exe 1412 reg.exe 4876 reg.exe 5076 reg.exe 3188 reg.exe 2168 reg.exe 4600 reg.exe 4348 reg.exe 916 reg.exe 672 reg.exe 1832 reg.exe 1928 reg.exe 4824 reg.exe 1360 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4648 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4648 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4648 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4648 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 636 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 636 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 636 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 636 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 432 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 432 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 432 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 432 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3204 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3204 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3204 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3204 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4540 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4540 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4540 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4540 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3244 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3244 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3244 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3244 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4944 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4944 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4944 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4944 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4328 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4328 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4328 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 4328 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1160 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1160 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1160 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1160 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1604 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1604 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1604 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1604 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1640 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1640 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1640 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 1640 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3352 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3352 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3352 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 3352 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2788 fcwIccAo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe 2788 fcwIccAo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 4432 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 83 PID 5016 wrote to memory of 4432 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 83 PID 5016 wrote to memory of 4432 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 83 PID 5016 wrote to memory of 2788 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 84 PID 5016 wrote to memory of 2788 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 84 PID 5016 wrote to memory of 2788 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 84 PID 5016 wrote to memory of 3092 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 85 PID 5016 wrote to memory of 3092 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 85 PID 5016 wrote to memory of 3092 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 85 PID 3092 wrote to memory of 4624 3092 cmd.exe 87 PID 3092 wrote to memory of 4624 3092 cmd.exe 87 PID 3092 wrote to memory of 4624 3092 cmd.exe 87 PID 5016 wrote to memory of 2492 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 88 PID 5016 wrote to memory of 2492 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 88 PID 5016 wrote to memory of 2492 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 88 PID 5016 wrote to memory of 3100 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 89 PID 5016 wrote to memory of 3100 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 89 PID 5016 wrote to memory of 3100 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 89 PID 5016 wrote to memory of 2672 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 90 PID 5016 wrote to memory of 2672 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 90 PID 5016 wrote to memory of 2672 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 90 PID 5016 wrote to memory of 2920 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 91 PID 5016 wrote to memory of 2920 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 91 PID 5016 wrote to memory of 2920 5016 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 91 PID 2920 wrote to memory of 4748 2920 cmd.exe 96 PID 2920 wrote to memory of 4748 2920 cmd.exe 96 PID 2920 wrote to memory of 4748 2920 cmd.exe 96 PID 4624 wrote to memory of 1656 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 97 PID 4624 wrote to memory of 1656 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 97 PID 4624 wrote to memory of 1656 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 97 PID 1656 wrote to memory of 3652 1656 cmd.exe 99 PID 1656 wrote to memory of 3652 1656 cmd.exe 99 PID 1656 wrote to memory of 3652 1656 cmd.exe 99 PID 4624 wrote to memory of 2300 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 100 PID 4624 wrote to memory of 2300 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 100 PID 4624 wrote to memory of 2300 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 100 PID 4624 wrote to memory of 4596 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 101 PID 4624 wrote to memory of 4596 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 101 PID 4624 wrote to memory of 4596 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 101 PID 4624 wrote to memory of 4988 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 102 PID 4624 wrote to memory of 4988 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 102 PID 4624 wrote to memory of 4988 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 102 PID 4624 wrote to memory of 4668 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 103 PID 4624 wrote to memory of 4668 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 103 PID 4624 wrote to memory of 4668 4624 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 103 PID 4668 wrote to memory of 3024 4668 cmd.exe 108 PID 4668 wrote to memory of 3024 4668 cmd.exe 108 PID 4668 wrote to memory of 3024 4668 cmd.exe 108 PID 3652 wrote to memory of 660 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 109 PID 3652 wrote to memory of 660 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 109 PID 3652 wrote to memory of 660 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 109 PID 660 wrote to memory of 4648 660 cmd.exe 111 PID 660 wrote to memory of 4648 660 cmd.exe 111 PID 660 wrote to memory of 4648 660 cmd.exe 111 PID 3652 wrote to memory of 2696 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 112 PID 3652 wrote to memory of 2696 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 112 PID 3652 wrote to memory of 2696 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 112 PID 3652 wrote to memory of 4220 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 113 PID 3652 wrote to memory of 4220 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 113 PID 3652 wrote to memory of 4220 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 113 PID 3652 wrote to memory of 4992 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 114 PID 3652 wrote to memory of 4992 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 114 PID 3652 wrote to memory of 4992 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 114 PID 3652 wrote to memory of 3960 3652 2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\PIkUYskY\LUwMEQoA.exe"C:\Users\Admin\PIkUYskY\LUwMEQoA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4432
-
-
C:\ProgramData\KGwYEkMA\fcwIccAo.exe"C:\ProgramData\KGwYEkMA\fcwIccAo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"8⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"10⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"12⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"14⤵
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"16⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"18⤵
- System Location Discovery: System Language Discovery
PID:996 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"20⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"22⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"24⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"26⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"28⤵
- System Location Discovery: System Language Discovery
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"30⤵PID:4424
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"32⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock33⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"34⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock35⤵
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"36⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock37⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"38⤵
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock39⤵PID:1364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"40⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock41⤵PID:1048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"42⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock43⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"44⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock45⤵
- System Location Discovery: System Language Discovery
PID:4328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"46⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock47⤵PID:3276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"48⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock49⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"50⤵
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock51⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"52⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock53⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"54⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock55⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"56⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock57⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"58⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock59⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"60⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock61⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"62⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock63⤵PID:1404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"64⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock65⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"66⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock67⤵PID:916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"68⤵
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock69⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"70⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock71⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"72⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock73⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"74⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock75⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"76⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock77⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"78⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock79⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"80⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock81⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"82⤵PID:1412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock83⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"84⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock85⤵PID:4548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"86⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock87⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"88⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock89⤵PID:3096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"90⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock91⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"92⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock93⤵PID:1856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"94⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock95⤵PID:3820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"96⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock97⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"98⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock99⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"100⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock101⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"102⤵PID:1984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:1196
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock103⤵PID:2004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"104⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock105⤵PID:3448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"106⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock107⤵
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"108⤵PID:4352
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock109⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"110⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock111⤵
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"112⤵PID:3084
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock113⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"114⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock115⤵PID:1200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"116⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock117⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"118⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock119⤵PID:4728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"120⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock121⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-21_9fac3e4225b3aaacbf2a59a2bcffba00_virlock"122⤵PID:2112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-