Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe
-
Size
116KB
-
MD5
12260695d71062df9ea968a055fdbef2
-
SHA1
92bbd02bfd8c120a1f8dbe318df44eef0169ac6f
-
SHA256
59426cd7f74386ffa6b60688e2b1bea72031ca9b8f706a746e0c4f1da28e1099
-
SHA512
3362480b944bc3481a56b5f21ad893b7ee3004929d54fdadd5469d322a0c78ab4b4d323a454b5e916e53549ea1c0ef20a7840213f219e6799d9a019132b676c3
-
SSDEEP
3072:oD/79kC4hMNPpowSFcAN8OdxyTrjCMznKHB:oD/O1MNPqwSFtPdxyTXp
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Control Panel\International\Geo\Nation xcYAwsIM.exe -
Executes dropped EXE 2 IoCs
pid Process 2928 xcYAwsIM.exe 2720 aCgkAQQg.exe -
Loads dropped DLL 20 IoCs
pid Process 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aCgkAQQg.exe = "C:\\ProgramData\\kgYwAggM\\aCgkAQQg.exe" aCgkAQQg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\xcYAwsIM.exe = "C:\\Users\\Admin\\naooscwU\\xcYAwsIM.exe" 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aCgkAQQg.exe = "C:\\ProgramData\\kgYwAggM\\aCgkAQQg.exe" 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\xcYAwsIM.exe = "C:\\Users\\Admin\\naooscwU\\xcYAwsIM.exe" xcYAwsIM.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico xcYAwsIM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 760 reg.exe 1408 reg.exe 2232 reg.exe 2504 reg.exe 2604 reg.exe 1144 reg.exe 1772 reg.exe 1332 reg.exe 1736 reg.exe 1376 reg.exe 1984 reg.exe 676 reg.exe 1848 reg.exe 1736 reg.exe 2420 reg.exe 2920 reg.exe 2380 reg.exe 856 reg.exe 2744 reg.exe 676 reg.exe 1448 reg.exe 2356 reg.exe 1836 reg.exe 2624 reg.exe 2752 reg.exe 2036 reg.exe 868 reg.exe 1060 reg.exe 884 reg.exe 1656 reg.exe 1516 reg.exe 2496 reg.exe 884 reg.exe 2588 reg.exe 1556 reg.exe 2132 reg.exe 2696 reg.exe 2480 reg.exe 2712 reg.exe 2860 reg.exe 1632 reg.exe 1228 reg.exe 612 reg.exe 2236 reg.exe 1512 reg.exe 1840 reg.exe 3056 reg.exe 2740 reg.exe 1848 reg.exe 3068 reg.exe 2832 reg.exe 708 reg.exe 2676 reg.exe 328 reg.exe 2896 reg.exe 1736 reg.exe 2552 reg.exe 2888 reg.exe 1764 reg.exe 2704 reg.exe 2260 reg.exe 2080 reg.exe 2712 reg.exe 1700 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2632 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2632 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 584 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 584 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1836 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1836 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1420 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1420 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 3004 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 3004 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2472 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2472 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1640 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1640 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2360 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2360 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 576 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 576 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2056 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2056 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2232 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2232 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2660 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2660 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2500 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2500 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2312 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2312 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2964 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2964 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2952 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2952 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2784 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2784 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2668 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2668 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2848 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2848 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 3032 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 3032 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1212 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1212 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2528 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2528 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1984 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1984 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2696 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2696 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1508 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1508 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2116 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2116 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2776 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2776 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2772 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2772 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2068 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 2068 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 1512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2928 xcYAwsIM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe 2928 xcYAwsIM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2928 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 28 PID 2188 wrote to memory of 2928 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 28 PID 2188 wrote to memory of 2928 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 28 PID 2188 wrote to memory of 2928 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 28 PID 2188 wrote to memory of 2720 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 29 PID 2188 wrote to memory of 2720 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 29 PID 2188 wrote to memory of 2720 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 29 PID 2188 wrote to memory of 2720 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 29 PID 2188 wrote to memory of 2668 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 30 PID 2188 wrote to memory of 2668 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 30 PID 2188 wrote to memory of 2668 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 30 PID 2188 wrote to memory of 2668 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 30 PID 2668 wrote to memory of 2512 2668 cmd.exe 33 PID 2668 wrote to memory of 2512 2668 cmd.exe 33 PID 2668 wrote to memory of 2512 2668 cmd.exe 33 PID 2668 wrote to memory of 2512 2668 cmd.exe 33 PID 2188 wrote to memory of 2504 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 32 PID 2188 wrote to memory of 2504 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 32 PID 2188 wrote to memory of 2504 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 32 PID 2188 wrote to memory of 2504 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 32 PID 2188 wrote to memory of 2496 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 34 PID 2188 wrote to memory of 2496 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 34 PID 2188 wrote to memory of 2496 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 34 PID 2188 wrote to memory of 2496 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 34 PID 2188 wrote to memory of 2544 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 35 PID 2188 wrote to memory of 2544 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 35 PID 2188 wrote to memory of 2544 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 35 PID 2188 wrote to memory of 2544 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 35 PID 2188 wrote to memory of 2428 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 39 PID 2188 wrote to memory of 2428 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 39 PID 2188 wrote to memory of 2428 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 39 PID 2188 wrote to memory of 2428 2188 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 39 PID 2512 wrote to memory of 2908 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 42 PID 2512 wrote to memory of 2908 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 42 PID 2512 wrote to memory of 2908 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 42 PID 2512 wrote to memory of 2908 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 42 PID 2428 wrote to memory of 2412 2428 cmd.exe 41 PID 2428 wrote to memory of 2412 2428 cmd.exe 41 PID 2428 wrote to memory of 2412 2428 cmd.exe 41 PID 2428 wrote to memory of 2412 2428 cmd.exe 41 PID 2908 wrote to memory of 2632 2908 cmd.exe 44 PID 2908 wrote to memory of 2632 2908 cmd.exe 44 PID 2908 wrote to memory of 2632 2908 cmd.exe 44 PID 2908 wrote to memory of 2632 2908 cmd.exe 44 PID 2512 wrote to memory of 2564 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 45 PID 2512 wrote to memory of 2564 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 45 PID 2512 wrote to memory of 2564 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 45 PID 2512 wrote to memory of 2564 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 45 PID 2512 wrote to memory of 2752 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 46 PID 2512 wrote to memory of 2752 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 46 PID 2512 wrote to memory of 2752 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 46 PID 2512 wrote to memory of 2752 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 46 PID 2512 wrote to memory of 2604 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 49 PID 2512 wrote to memory of 2604 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 49 PID 2512 wrote to memory of 2604 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 49 PID 2512 wrote to memory of 2604 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 49 PID 2512 wrote to memory of 288 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 50 PID 2512 wrote to memory of 288 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 50 PID 2512 wrote to memory of 288 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 50 PID 2512 wrote to memory of 288 2512 2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe 50 PID 288 wrote to memory of 2156 288 cmd.exe 53 PID 288 wrote to memory of 2156 288 cmd.exe 53 PID 288 wrote to memory of 2156 288 cmd.exe 53 PID 288 wrote to memory of 2156 288 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\naooscwU\xcYAwsIM.exe"C:\Users\Admin\naooscwU\xcYAwsIM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2928
-
-
C:\ProgramData\kgYwAggM\aCgkAQQg.exe"C:\ProgramData\kgYwAggM\aCgkAQQg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2720
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"6⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"8⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"12⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"14⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"16⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"18⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"20⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"22⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"24⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"26⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"28⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"30⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"32⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"34⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"36⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"38⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"40⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"42⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"44⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"46⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"48⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"50⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"52⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"54⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"56⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"58⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"60⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"62⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"64⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock65⤵PID:2564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"66⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock67⤵PID:1800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"68⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock69⤵PID:692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"70⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock71⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"72⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock73⤵PID:1276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"74⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock75⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"76⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock77⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"78⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock79⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"80⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock81⤵PID:1280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"82⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock83⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"84⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock85⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"86⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock87⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"88⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock89⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"90⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock91⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"92⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock93⤵PID:2008
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"94⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock95⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"96⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock97⤵PID:2836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"98⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock99⤵PID:1356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"100⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock101⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"102⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock103⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"104⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock105⤵PID:1228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"106⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock107⤵PID:2808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"108⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock109⤵PID:2580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"110⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock111⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"112⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock113⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"114⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock115⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"116⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock117⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"118⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock119⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"120⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock121⤵PID:1732
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-29_12260695d71062df9ea968a055fdbef2_virlock"122⤵PID:1116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-