Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
-
Size
882KB
-
MD5
784d6132ccc958a3e44ac9b8f26b64e1
-
SHA1
3db2b316b3bf5bf9cc5c69e90f013f34ed283d34
-
SHA256
efc7a45fe8efcbc92a1f16bfc3cfd1666fda5340815322af7cbee709c51d7cdc
-
SHA512
5a5ca6f606c3dda9751766cfe799f3f35bf0337494bd21843e6df70588cca0d37014431338c3ed8652fbce4898980db59c063c89f3aa6c89e3a255d7eca5eb6a
-
SSDEEP
24576:H694Zofqlkfx+cvhGHv9aTCJxlCEbrjUfyiXbfHG:H7qCgxHm9aUj8yizH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (76) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
HYIYgIAE.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation HYIYgIAE.exe -
Executes dropped EXE 2 IoCs
Processes:
HYIYgIAE.exeeEEAkwoM.exepid process 4976 HYIYgIAE.exe 3716 eEEAkwoM.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeHYIYgIAE.exeeEEAkwoM.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HYIYgIAE.exe = "C:\\Users\\Admin\\HQIkcIUg\\HYIYgIAE.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eEEAkwoM.exe = "C:\\ProgramData\\BewgUkIQ\\eEEAkwoM.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HYIYgIAE.exe = "C:\\Users\\Admin\\HQIkcIUg\\HYIYgIAE.exe" HYIYgIAE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eEEAkwoM.exe = "C:\\ProgramData\\BewgUkIQ\\eEEAkwoM.exe" eEEAkwoM.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lIowYkQg.exe = "C:\\Users\\Admin\\mqMgcAEg\\lIowYkQg.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\YicMUgIM.exe = "C:\\ProgramData\\ViUYUEwU\\YicMUgIM.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe -
Drops file in System32 directory 2 IoCs
Processes:
HYIYgIAE.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe HYIYgIAE.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe HYIYgIAE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3352 1436 WerFault.exe YicMUgIM.exe 3444 4204 WerFault.exe lIowYkQg.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cscript.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execscript.exereg.exereg.execmd.exereg.execscript.exereg.exereg.exereg.exereg.execmd.execmd.execmd.exereg.execscript.execscript.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execscript.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.execscript.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execscript.execscript.execscript.execmd.execscript.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exereg.exereg.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exereg.exereg.execmd.exereg.exereg.execmd.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 3740 reg.exe 5048 reg.exe 4876 reg.exe 2200 reg.exe 4524 reg.exe 3188 reg.exe 2396 reg.exe 444 reg.exe 228 reg.exe 4412 reg.exe 2224 reg.exe 956 reg.exe 2024 reg.exe 876 reg.exe 5052 reg.exe 3496 reg.exe 2860 reg.exe 2560 reg.exe 3260 reg.exe 4980 reg.exe 4104 reg.exe 1148 reg.exe 992 reg.exe 796 reg.exe 1496 reg.exe 2636 reg.exe 4820 reg.exe 4352 reg.exe 32 reg.exe 3016 reg.exe 3956 reg.exe 636 reg.exe 4124 reg.exe 2768 reg.exe 4156 reg.exe 2376 reg.exe 3016 reg.exe 4776 reg.exe 4296 reg.exe 2772 reg.exe 3980 reg.exe 4428 reg.exe 1736 reg.exe 1408 reg.exe 5108 reg.exe 3532 reg.exe 616 reg.exe 2524 reg.exe 2396 reg.exe 1736 reg.exe 2456 reg.exe 3000 reg.exe 5072 reg.exe 3472 reg.exe 3472 reg.exe 3148 reg.exe 3532 reg.exe 4872 reg.exe 1640 reg.exe 3376 reg.exe 3452 reg.exe 3692 reg.exe 2024 reg.exe 2792 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exepid process 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2300 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2300 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2300 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2300 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4972 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4972 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4972 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4972 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2348 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2348 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2348 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2348 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4352 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4352 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4352 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4352 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1968 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1968 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1968 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1968 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4572 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4572 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4572 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4572 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4676 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4676 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4676 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4676 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3876 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3876 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3876 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3876 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 228 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 228 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 228 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 228 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4292 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4292 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4292 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4292 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2264 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2264 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2264 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2264 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 5084 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 5084 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 5084 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 5084 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3008 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3008 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3008 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3008 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
HYIYgIAE.exepid process 4976 HYIYgIAE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
HYIYgIAE.exepid process 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe 4976 HYIYgIAE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exedescription pid process target process PID 1848 wrote to memory of 4976 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe HYIYgIAE.exe PID 1848 wrote to memory of 4976 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe HYIYgIAE.exe PID 1848 wrote to memory of 4976 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe HYIYgIAE.exe PID 1848 wrote to memory of 3716 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe eEEAkwoM.exe PID 1848 wrote to memory of 3716 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe eEEAkwoM.exe PID 1848 wrote to memory of 3716 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe eEEAkwoM.exe PID 1848 wrote to memory of 5000 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1848 wrote to memory of 5000 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1848 wrote to memory of 5000 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1848 wrote to memory of 5052 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 5052 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 5052 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 5044 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 5044 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 5044 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 3184 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 3184 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 3184 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1848 wrote to memory of 2860 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1848 wrote to memory of 2860 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1848 wrote to memory of 2860 1848 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 5000 wrote to memory of 1336 5000 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 5000 wrote to memory of 1336 5000 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 5000 wrote to memory of 1336 5000 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2860 wrote to memory of 5108 2860 cmd.exe cscript.exe PID 2860 wrote to memory of 5108 2860 cmd.exe cscript.exe PID 2860 wrote to memory of 5108 2860 cmd.exe cscript.exe PID 1336 wrote to memory of 1816 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1336 wrote to memory of 1816 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1336 wrote to memory of 1816 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1816 wrote to memory of 3380 1816 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 1816 wrote to memory of 3380 1816 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 1816 wrote to memory of 3380 1816 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 1336 wrote to memory of 2972 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 2972 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 2972 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 4000 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 4000 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 4000 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 2032 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 2032 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 2032 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 1336 wrote to memory of 1172 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1336 wrote to memory of 1172 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1336 wrote to memory of 1172 1336 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 1172 wrote to memory of 1528 1172 cmd.exe cscript.exe PID 1172 wrote to memory of 1528 1172 cmd.exe cscript.exe PID 1172 wrote to memory of 1528 1172 cmd.exe cscript.exe PID 3380 wrote to memory of 4544 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3380 wrote to memory of 4544 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3380 wrote to memory of 4544 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3380 wrote to memory of 4444 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 4444 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 4444 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 2224 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 2224 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 2224 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 4324 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 4324 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 4324 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3380 wrote to memory of 1948 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3380 wrote to memory of 1948 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3380 wrote to memory of 1948 3380 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4544 wrote to memory of 2300 4544 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\HQIkcIUg\HYIYgIAE.exe"C:\Users\Admin\HQIkcIUg\HYIYgIAE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4976
-
-
C:\ProgramData\BewgUkIQ\eEEAkwoM.exe"C:\ProgramData\BewgUkIQ\eEEAkwoM.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"8⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"10⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"12⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock13⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"14⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"16⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"18⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"20⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock21⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"22⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"24⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"26⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"28⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"30⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock31⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"32⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock33⤵PID:1048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"34⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock35⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"36⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock37⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"38⤵PID:4800
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock39⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"40⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock41⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"42⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock43⤵PID:1708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"44⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock45⤵PID:2212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"46⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock47⤵PID:3380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"48⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock49⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"50⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock51⤵PID:4652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"52⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock53⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"54⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock55⤵
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"56⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock57⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"58⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock59⤵PID:3480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"60⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock61⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"62⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock63⤵PID:1408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"64⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock65⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"66⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock67⤵PID:956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"68⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock69⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"70⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock71⤵PID:1580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"72⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock73⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"74⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock75⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"76⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock77⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"78⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock79⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"80⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock81⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"82⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock83⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"84⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock85⤵PID:2120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"86⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock87⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"88⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock89⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"90⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock91⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"92⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock93⤵PID:2616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"94⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock95⤵PID:4576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"96⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock97⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"98⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock99⤵PID:628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"100⤵PID:1380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock101⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"102⤵PID:2308
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:4120
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock103⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"104⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock105⤵
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"106⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock107⤵PID:2768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"108⤵
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock109⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"110⤵
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock111⤵PID:2096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"112⤵
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock113⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"114⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock115⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"116⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock117⤵PID:1676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"118⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock119⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"120⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock121⤵
- System Location Discovery: System Language Discovery
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"122⤵
- System Location Discovery: System Language Discovery
PID:4032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-