Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe
-
Size
234KB
-
MD5
d3ab46566b611cca7e28039d1cb82c4e
-
SHA1
1a9f7a791977122059bf81f7eea79845380a4d1f
-
SHA256
c35f718d6149a1388bdc2a6ed535f10afd5f8cf2ae88f9380dbd45d07116decf
-
SHA512
41856cd28703eb8e05ce2b1b7d5da876016504fb27e5151229c682e2b9e5a89ee18855a0289c5b22b4c187c47a7e24cc3e9579bdb812c69cb3b917384eb443f8
-
SSDEEP
3072:/1OGpA0lyfj10YoA7DEvfvNlq1fK3F9/PIzIEJY2j76KE8Bf47qW:/4Gna10YD7DFKV93KXjWAWqW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation FUggIcck.exe -
Executes dropped EXE 2 IoCs
pid Process 3060 FUggIcck.exe 3200 VoEIsAAc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VoEIsAAc.exe = "C:\\ProgramData\\qcMQkgAE\\VoEIsAAc.exe" VoEIsAAc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FUggIcck.exe = "C:\\Users\\Admin\\KoMUgEQQ\\FUggIcck.exe" 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\VoEIsAAc.exe = "C:\\ProgramData\\qcMQkgAE\\VoEIsAAc.exe" 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FUggIcck.exe = "C:\\Users\\Admin\\KoMUgEQQ\\FUggIcck.exe" FUggIcck.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe FUggIcck.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe FUggIcck.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2412 reg.exe 1068 reg.exe 4956 Process not Found 4484 reg.exe 4976 reg.exe 984 Process not Found 3436 reg.exe 4840 reg.exe 816 reg.exe 2728 reg.exe 5104 reg.exe 860 reg.exe 5004 reg.exe 4964 Process not Found 232 Process not Found 3952 reg.exe 1836 reg.exe 3000 reg.exe 452 reg.exe 2036 reg.exe 4064 reg.exe 1968 reg.exe 3296 reg.exe 2036 reg.exe 1464 reg.exe 60 reg.exe 4048 Process not Found 4040 reg.exe 3376 reg.exe 4184 reg.exe 4016 reg.exe 1620 reg.exe 4100 reg.exe 2412 reg.exe 2340 reg.exe 1712 reg.exe 4520 reg.exe 3792 Process not Found 4696 reg.exe 4288 reg.exe 4880 reg.exe 4680 reg.exe 2340 reg.exe 1660 reg.exe 736 reg.exe 3628 reg.exe 4848 reg.exe 4520 reg.exe 3360 reg.exe 1668 reg.exe 1084 reg.exe 4288 reg.exe 4012 reg.exe 1668 reg.exe 4176 reg.exe 4724 reg.exe 2820 reg.exe 3348 Process not Found 2620 Process not Found 3168 reg.exe 4444 reg.exe 4280 reg.exe 4516 reg.exe 3148 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2976 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2976 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2976 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2976 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 5072 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 5072 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 5072 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 5072 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3688 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3688 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3688 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3688 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3844 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2752 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2752 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2752 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2752 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2312 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2312 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2312 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2312 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4784 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4784 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4784 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4784 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2368 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2368 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2368 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 2368 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 984 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 984 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 984 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 984 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3572 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3572 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3572 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3572 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4012 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4012 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4012 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 4012 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3952 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3952 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3952 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 3952 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 FUggIcck.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe 3060 FUggIcck.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 3060 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 85 PID 3236 wrote to memory of 3060 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 85 PID 3236 wrote to memory of 3060 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 85 PID 3236 wrote to memory of 3200 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 86 PID 3236 wrote to memory of 3200 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 86 PID 3236 wrote to memory of 3200 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 86 PID 3236 wrote to memory of 1852 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 87 PID 3236 wrote to memory of 1852 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 87 PID 3236 wrote to memory of 1852 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 87 PID 3236 wrote to memory of 696 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 89 PID 3236 wrote to memory of 696 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 89 PID 3236 wrote to memory of 696 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 89 PID 3236 wrote to memory of 208 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 90 PID 3236 wrote to memory of 208 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 90 PID 3236 wrote to memory of 208 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 90 PID 3236 wrote to memory of 412 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 91 PID 3236 wrote to memory of 412 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 91 PID 3236 wrote to memory of 412 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 91 PID 3236 wrote to memory of 2980 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 92 PID 3236 wrote to memory of 2980 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 92 PID 3236 wrote to memory of 2980 3236 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 92 PID 1852 wrote to memory of 2828 1852 cmd.exe 96 PID 1852 wrote to memory of 2828 1852 cmd.exe 96 PID 1852 wrote to memory of 2828 1852 cmd.exe 96 PID 2980 wrote to memory of 2040 2980 cmd.exe 98 PID 2980 wrote to memory of 2040 2980 cmd.exe 98 PID 2980 wrote to memory of 2040 2980 cmd.exe 98 PID 2828 wrote to memory of 232 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 99 PID 2828 wrote to memory of 232 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 99 PID 2828 wrote to memory of 232 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 99 PID 232 wrote to memory of 1212 232 cmd.exe 101 PID 232 wrote to memory of 1212 232 cmd.exe 101 PID 232 wrote to memory of 1212 232 cmd.exe 101 PID 2828 wrote to memory of 3592 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 102 PID 2828 wrote to memory of 3592 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 102 PID 2828 wrote to memory of 3592 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 102 PID 2828 wrote to memory of 4040 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 103 PID 2828 wrote to memory of 4040 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 103 PID 2828 wrote to memory of 4040 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 103 PID 2828 wrote to memory of 1196 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 104 PID 2828 wrote to memory of 1196 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 104 PID 2828 wrote to memory of 1196 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 104 PID 2828 wrote to memory of 2212 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 105 PID 2828 wrote to memory of 2212 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 105 PID 2828 wrote to memory of 2212 2828 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 105 PID 2212 wrote to memory of 4000 2212 cmd.exe 110 PID 2212 wrote to memory of 4000 2212 cmd.exe 110 PID 2212 wrote to memory of 4000 2212 cmd.exe 110 PID 1212 wrote to memory of 4844 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 111 PID 1212 wrote to memory of 4844 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 111 PID 1212 wrote to memory of 4844 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 111 PID 1212 wrote to memory of 2088 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 113 PID 1212 wrote to memory of 2088 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 113 PID 1212 wrote to memory of 2088 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 113 PID 4844 wrote to memory of 2976 4844 cmd.exe 115 PID 4844 wrote to memory of 2976 4844 cmd.exe 115 PID 4844 wrote to memory of 2976 4844 cmd.exe 115 PID 1212 wrote to memory of 4696 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 114 PID 1212 wrote to memory of 4696 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 114 PID 1212 wrote to memory of 4696 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 114 PID 1212 wrote to memory of 4356 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 116 PID 1212 wrote to memory of 4356 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 116 PID 1212 wrote to memory of 4356 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 116 PID 1212 wrote to memory of 888 1212 2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\KoMUgEQQ\FUggIcck.exe"C:\Users\Admin\KoMUgEQQ\FUggIcck.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3060
-
-
C:\ProgramData\qcMQkgAE\VoEIsAAc.exe"C:\ProgramData\qcMQkgAE\VoEIsAAc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3200
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"8⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"10⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"12⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"14⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"16⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"18⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"20⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"22⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"24⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"26⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"28⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"30⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"32⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock33⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"34⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock35⤵PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"36⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock37⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"38⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock39⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"40⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock41⤵PID:2280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"42⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock43⤵PID:412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"44⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock45⤵PID:736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"46⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock47⤵PID:2340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"48⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock49⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"50⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock51⤵PID:3616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"52⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock53⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"54⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock55⤵PID:908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"56⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock57⤵PID:4152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"58⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock59⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"60⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock61⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"62⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock63⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"64⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock65⤵PID:1668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"66⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock67⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"68⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock69⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"70⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock71⤵PID:2948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"72⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock73⤵PID:1816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"74⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock75⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"76⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock77⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"78⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock79⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"80⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock81⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"82⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock83⤵PID:3852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"84⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock85⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"86⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock87⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"88⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock89⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"90⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock91⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"92⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock93⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"94⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock95⤵PID:912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"96⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock97⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"98⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock99⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"100⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock101⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"102⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock103⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"104⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock105⤵PID:3064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"106⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock107⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"108⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock109⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"110⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock111⤵PID:3620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"112⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock113⤵PID:540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"114⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock115⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"116⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock117⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"118⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock119⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"120⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock121⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-11_d3ab46566b611cca7e28039d1cb82c4e_virlock"122⤵PID:4548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-