Analysis
-
max time kernel
22s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-04-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
-
Size
234KB
-
MD5
d3ab46566b611cca7e28039d1cb82c4e
-
SHA1
1a9f7a791977122059bf81f7eea79845380a4d1f
-
SHA256
c35f718d6149a1388bdc2a6ed535f10afd5f8cf2ae88f9380dbd45d07116decf
-
SHA512
41856cd28703eb8e05ce2b1b7d5da876016504fb27e5151229c682e2b9e5a89ee18855a0289c5b22b4c187c47a7e24cc3e9579bdb812c69cb3b917384eb443f8
-
SSDEEP
3072:/1OGpA0lyfj10YoA7DEvfvNlq1fK3F9/PIzIEJY2j76KE8Bf47qW:/4Gna10YD7DFKV93KXjWAWqW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2440 rmoAYAUo.exe 2208 xmMAQokI.exe -
Loads dropped DLL 20 IoCs
pid Process 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe 2440 rmoAYAUo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmMAQokI.exe = "C:\\Users\\Admin\\vmEUwooM\\xmMAQokI.exe" 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rmoAYAUo.exe = "C:\\ProgramData\\HssAcswc\\rmoAYAUo.exe" 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rmoAYAUo.exe = "C:\\ProgramData\\HssAcswc\\rmoAYAUo.exe" rmoAYAUo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\xmMAQokI.exe = "C:\\Users\\Admin\\vmEUwooM\\xmMAQokI.exe" xmMAQokI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2848 reg.exe 2500 reg.exe 1612 reg.exe 3044 reg.exe 2484 reg.exe 3036 reg.exe 2944 reg.exe 1424 reg.exe 1540 reg.exe 1800 reg.exe 2476 reg.exe 1104 reg.exe 2648 reg.exe 2728 reg.exe 2424 reg.exe 2376 reg.exe 2168 reg.exe 2524 reg.exe 2908 reg.exe 1780 reg.exe 1632 reg.exe 2756 reg.exe 2788 reg.exe 2272 reg.exe 2060 reg.exe 780 reg.exe 2688 reg.exe 2844 reg.exe 1292 reg.exe 924 reg.exe 2988 reg.exe 1040 reg.exe 1664 reg.exe 844 reg.exe 2376 reg.exe 2972 reg.exe 2720 reg.exe 2340 reg.exe 2112 reg.exe 2808 reg.exe 2220 reg.exe 2988 reg.exe 2556 reg.exe 1904 reg.exe 644 reg.exe 1896 reg.exe 2636 reg.exe 2524 reg.exe 2200 reg.exe 2004 reg.exe 1896 reg.exe 1456 reg.exe 2904 reg.exe 1316 reg.exe 3032 reg.exe 2040 reg.exe 872 reg.exe 1424 reg.exe 1772 reg.exe 1192 reg.exe 780 reg.exe 1556 reg.exe 1756 reg.exe 2752 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2052 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2052 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2256 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2256 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 604 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 604 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2304 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2304 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1004 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1004 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2728 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2728 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2988 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2988 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2768 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2768 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2308 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2308 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1540 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1540 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2704 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2704 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2132 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2132 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2020 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2020 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 712 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 712 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 576 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 576 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2108 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2108 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2896 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2896 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2560 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2560 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1980 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1980 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1700 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1700 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 760 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 760 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 544 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 544 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2680 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2680 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2456 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2456 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2800 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2800 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2000 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2000 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1720 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1720 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2684 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2684 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2208 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 28 PID 2220 wrote to memory of 2208 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 28 PID 2220 wrote to memory of 2208 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 28 PID 2220 wrote to memory of 2208 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 28 PID 2220 wrote to memory of 2440 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 29 PID 2220 wrote to memory of 2440 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 29 PID 2220 wrote to memory of 2440 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 29 PID 2220 wrote to memory of 2440 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 29 PID 2220 wrote to memory of 2624 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 30 PID 2220 wrote to memory of 2624 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 30 PID 2220 wrote to memory of 2624 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 30 PID 2220 wrote to memory of 2624 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 30 PID 2624 wrote to memory of 2632 2624 cmd.exe 33 PID 2624 wrote to memory of 2632 2624 cmd.exe 33 PID 2624 wrote to memory of 2632 2624 cmd.exe 33 PID 2624 wrote to memory of 2632 2624 cmd.exe 33 PID 2220 wrote to memory of 2880 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 32 PID 2220 wrote to memory of 2880 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 32 PID 2220 wrote to memory of 2880 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 32 PID 2220 wrote to memory of 2880 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 32 PID 2220 wrote to memory of 2720 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 34 PID 2220 wrote to memory of 2720 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 34 PID 2220 wrote to memory of 2720 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 34 PID 2220 wrote to memory of 2720 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 34 PID 2220 wrote to memory of 2688 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 36 PID 2220 wrote to memory of 2688 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 36 PID 2220 wrote to memory of 2688 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 36 PID 2220 wrote to memory of 2688 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 36 PID 2220 wrote to memory of 2644 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 39 PID 2220 wrote to memory of 2644 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 39 PID 2220 wrote to memory of 2644 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 39 PID 2220 wrote to memory of 2644 2220 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 39 PID 2644 wrote to memory of 2160 2644 cmd.exe 41 PID 2644 wrote to memory of 2160 2644 cmd.exe 41 PID 2644 wrote to memory of 2160 2644 cmd.exe 41 PID 2644 wrote to memory of 2160 2644 cmd.exe 41 PID 2632 wrote to memory of 2096 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 42 PID 2632 wrote to memory of 2096 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 42 PID 2632 wrote to memory of 2096 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 42 PID 2632 wrote to memory of 2096 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 42 PID 2096 wrote to memory of 2052 2096 cmd.exe 44 PID 2096 wrote to memory of 2052 2096 cmd.exe 44 PID 2096 wrote to memory of 2052 2096 cmd.exe 44 PID 2096 wrote to memory of 2052 2096 cmd.exe 44 PID 2632 wrote to memory of 1912 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 45 PID 2632 wrote to memory of 1912 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 45 PID 2632 wrote to memory of 1912 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 45 PID 2632 wrote to memory of 1912 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 45 PID 2632 wrote to memory of 780 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 46 PID 2632 wrote to memory of 780 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 46 PID 2632 wrote to memory of 780 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 46 PID 2632 wrote to memory of 780 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 46 PID 2632 wrote to memory of 1428 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 48 PID 2632 wrote to memory of 1428 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 48 PID 2632 wrote to memory of 1428 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 48 PID 2632 wrote to memory of 1428 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 48 PID 2632 wrote to memory of 1620 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 50 PID 2632 wrote to memory of 1620 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 50 PID 2632 wrote to memory of 1620 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 50 PID 2632 wrote to memory of 1620 2632 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 50 PID 1620 wrote to memory of 2364 1620 cmd.exe 53 PID 1620 wrote to memory of 2364 1620 cmd.exe 53 PID 1620 wrote to memory of 2364 1620 cmd.exe 53 PID 1620 wrote to memory of 2364 1620 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\vmEUwooM\xmMAQokI.exe"C:\Users\Admin\vmEUwooM\xmMAQokI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2208
-
-
C:\ProgramData\HssAcswc\rmoAYAUo.exe"C:\ProgramData\HssAcswc\rmoAYAUo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2440
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"6⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"8⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"10⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"12⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"14⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"16⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"18⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"20⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"22⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"24⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"26⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"28⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"30⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"32⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"34⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"36⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"38⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"40⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"42⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"44⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1700 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"46⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"48⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"50⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"52⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"54⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"56⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"58⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"60⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"62⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"64⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock65⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"66⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock67⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"68⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock69⤵PID:3048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"70⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock71⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"72⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock73⤵PID:1340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"74⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock75⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"76⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock77⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"78⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock79⤵PID:2320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"80⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock81⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"82⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock83⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"84⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock85⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"86⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock87⤵PID:624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"88⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock89⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"90⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock91⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"92⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock93⤵PID:2984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"94⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock95⤵PID:2512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"96⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock97⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"98⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock99⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"100⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock101⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"102⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock103⤵PID:1340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"104⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock105⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"106⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock107⤵PID:912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"108⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock109⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"110⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock111⤵PID:1780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"112⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock113⤵PID:324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"114⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock115⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"116⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock117⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"118⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock119⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"120⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock121⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"122⤵PID:1580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-