Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe
-
Size
882KB
-
MD5
784d6132ccc958a3e44ac9b8f26b64e1
-
SHA1
3db2b316b3bf5bf9cc5c69e90f013f34ed283d34
-
SHA256
efc7a45fe8efcbc92a1f16bfc3cfd1666fda5340815322af7cbee709c51d7cdc
-
SHA512
5a5ca6f606c3dda9751766cfe799f3f35bf0337494bd21843e6df70588cca0d37014431338c3ed8652fbce4898980db59c063c89f3aa6c89e3a255d7eca5eb6a
-
SSDEEP
24576:H694Zofqlkfx+cvhGHv9aTCJxlCEbrjUfyiXbfHG:H7qCgxHm9aUj8yizH
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
icUssEIs.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation icUssEIs.exe -
Executes dropped EXE 2 IoCs
Processes:
icUssEIs.exefGogsEAI.exepid process 1192 icUssEIs.exe 4324 fGogsEAI.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeicUssEIs.exefGogsEAI.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WaUUIoAc.exe = "C:\\ProgramData\\RSEowoUc\\WaUUIoAc.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\icUssEIs.exe = "C:\\Users\\Admin\\pWEkggkI\\icUssEIs.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fGogsEAI.exe = "C:\\ProgramData\\DiQIQgUo\\fGogsEAI.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\icUssEIs.exe = "C:\\Users\\Admin\\pWEkggkI\\icUssEIs.exe" icUssEIs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\fGogsEAI.exe = "C:\\ProgramData\\DiQIQgUo\\fGogsEAI.exe" fGogsEAI.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WwUwIokY.exe = "C:\\Users\\Admin\\lMkgwoos\\WwUwIokY.exe" 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe -
Drops file in System32 directory 2 IoCs
Processes:
icUssEIs.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe icUssEIs.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe icUssEIs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4072 3892 WerFault.exe WwUwIokY.exe 2332 4244 WerFault.exe WaUUIoAc.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execscript.exereg.execmd.execmd.exereg.execmd.exereg.exereg.exereg.execscript.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exeWwUwIokY.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.execscript.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exereg.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.exereg.execmd.execmd.execscript.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exereg.execscript.execmd.execmd.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.execscript.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execscript.exereg.exereg.exereg.execscript.exereg.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exereg.exereg.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WwUwIokY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 760 reg.exe 1684 reg.exe 3260 reg.exe 2112 reg.exe 2168 reg.exe 3896 reg.exe 772 reg.exe 3408 reg.exe 2664 reg.exe 4932 reg.exe 1328 reg.exe 432 reg.exe 836 reg.exe 1404 reg.exe 2796 reg.exe 4700 reg.exe 2384 reg.exe 4352 reg.exe 2216 reg.exe 4208 reg.exe 3820 reg.exe 432 reg.exe 4592 reg.exe 1100 reg.exe 1080 reg.exe 3896 reg.exe 1080 reg.exe 316 reg.exe 3596 reg.exe 3912 reg.exe 3424 reg.exe 1648 reg.exe 4292 reg.exe 4376 reg.exe 4588 reg.exe 4596 reg.exe 2852 reg.exe 1156 reg.exe 2236 reg.exe 2948 reg.exe 3984 reg.exe 1900 reg.exe 892 reg.exe 1724 reg.exe 2480 reg.exe 540 reg.exe 3152 reg.exe 4592 reg.exe 2236 reg.exe 4440 reg.exe 4160 reg.exe 4944 reg.exe 2204 reg.exe 5108 reg.exe 512 reg.exe 1872 reg.exe 2408 reg.exe 4932 reg.exe 2088 reg.exe 1528 reg.exe 3992 reg.exe 1828 reg.exe 4296 reg.exe 4276 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exepid process 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2404 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2404 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2404 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2404 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4124 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4124 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4124 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4124 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1760 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1760 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1760 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1760 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2856 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2856 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2856 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2856 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3500 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3500 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3500 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3500 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2408 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2408 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2408 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2408 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1044 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1044 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1044 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 1044 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2168 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2168 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2168 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2168 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2516 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2516 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2516 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 2516 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4948 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4948 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4948 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4948 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4592 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4592 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4592 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4592 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3448 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3448 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3448 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 3448 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4040 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4040 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4040 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe 4040 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
icUssEIs.exepid process 1192 icUssEIs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
icUssEIs.exepid process 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe 1192 icUssEIs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.execmd.exe2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.execmd.exedescription pid process target process PID 4988 wrote to memory of 1192 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe icUssEIs.exe PID 4988 wrote to memory of 1192 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe icUssEIs.exe PID 4988 wrote to memory of 1192 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe icUssEIs.exe PID 4988 wrote to memory of 4324 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe fGogsEAI.exe PID 4988 wrote to memory of 4324 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe fGogsEAI.exe PID 4988 wrote to memory of 4324 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe fGogsEAI.exe PID 4988 wrote to memory of 2876 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4988 wrote to memory of 2876 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4988 wrote to memory of 2876 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4988 wrote to memory of 3912 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 3912 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 3912 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 5068 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 5068 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 5068 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 4556 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 4556 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 4556 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 4988 wrote to memory of 4712 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4988 wrote to memory of 4712 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 4988 wrote to memory of 4712 4988 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 2876 wrote to memory of 3924 2876 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2876 wrote to memory of 3924 2876 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2876 wrote to memory of 3924 2876 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 4712 wrote to memory of 4892 4712 cmd.exe cscript.exe PID 4712 wrote to memory of 4892 4712 cmd.exe cscript.exe PID 4712 wrote to memory of 4892 4712 cmd.exe cscript.exe PID 3924 wrote to memory of 2100 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3924 wrote to memory of 2100 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3924 wrote to memory of 2100 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3924 wrote to memory of 2452 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 2452 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 2452 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 2808 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 2808 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 2808 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 1320 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 1320 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 1320 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 3924 wrote to memory of 800 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3924 wrote to memory of 800 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3924 wrote to memory of 800 3924 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 2100 wrote to memory of 2920 2100 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2100 wrote to memory of 2920 2100 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2100 wrote to memory of 2920 2100 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 800 wrote to memory of 3156 800 cmd.exe cscript.exe PID 800 wrote to memory of 3156 800 cmd.exe cscript.exe PID 800 wrote to memory of 3156 800 cmd.exe cscript.exe PID 2920 wrote to memory of 3760 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 2920 wrote to memory of 3760 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 2920 wrote to memory of 3760 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe PID 3760 wrote to memory of 2404 3760 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 3760 wrote to memory of 2404 3760 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 3760 wrote to memory of 2404 3760 cmd.exe 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe PID 2920 wrote to memory of 752 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 2920 wrote to memory of 752 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 2920 wrote to memory of 752 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe reg.exe PID 2920 wrote to memory of 4700 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 4700 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 4700 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 1076 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 1076 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 1076 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe Conhost.exe PID 2920 wrote to memory of 384 2920 2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\pWEkggkI\icUssEIs.exe"C:\Users\Admin\pWEkggkI\icUssEIs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1192
-
-
C:\ProgramData\DiQIQgUo\fGogsEAI.exe"C:\ProgramData\DiQIQgUo\fGogsEAI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"8⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"10⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"12⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"14⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"16⤵
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock17⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"18⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"20⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"22⤵
- System Location Discovery: System Language Discovery
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock23⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"24⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock25⤵
- Adds Run key to start application
PID:4772 -
C:\Users\Admin\lMkgwoos\WwUwIokY.exe"C:\Users\Admin\lMkgwoos\WwUwIokY.exe"26⤵
- System Location Discovery: System Language Discovery
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 22827⤵
- Program crash
PID:4072
-
-
-
C:\ProgramData\RSEowoUc\WaUUIoAc.exe"C:\ProgramData\RSEowoUc\WaUUIoAc.exe"26⤵PID:4244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 22427⤵
- Program crash
PID:2332
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"26⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"28⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"30⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"32⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"34⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock35⤵PID:4776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"36⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock37⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"38⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock39⤵PID:2780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"40⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock41⤵PID:684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"42⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock43⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"44⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock45⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"46⤵
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock47⤵PID:32
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"48⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock49⤵PID:3240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"50⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock51⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"52⤵PID:1488
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock53⤵
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"54⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock55⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"56⤵
- System Location Discovery: System Language Discovery
PID:772 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock57⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"58⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock59⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"60⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock61⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"62⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock63⤵
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"64⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock65⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"66⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock67⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"68⤵PID:4984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock69⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"70⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock71⤵PID:1416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"72⤵PID:4596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV173⤵PID:516
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock73⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"74⤵
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock75⤵PID:760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"76⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock77⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"78⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock79⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"80⤵PID:4568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock81⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"82⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock83⤵PID:4668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"84⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock85⤵
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"86⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock87⤵PID:1436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"88⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock89⤵PID:4224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"90⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock91⤵PID:2068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"92⤵
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock93⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"94⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock95⤵PID:3728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"96⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock97⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"98⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock99⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"100⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock101⤵PID:2464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"102⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock103⤵PID:3900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"104⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock105⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"106⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock107⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"108⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock109⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"110⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock111⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"112⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock113⤵PID:368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"114⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock115⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"116⤵PID:3892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:4676
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock117⤵
- System Location Discovery: System Language Discovery
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"118⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock119⤵PID:4440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"120⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock121⤵PID:1596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-11-22_784d6132ccc958a3e44ac9b8f26b64e1_virlock"122⤵PID:1100
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-