Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe
-
Size
113KB
-
MD5
a442929304394d9e6ccb16002e28fb8c
-
SHA1
7f51867c17cf7fd5438078cd920a6958e2f7988a
-
SHA256
ec144f775dc2a4984431b171c719f488946bdd87f4fd7c5f54983c572e1b4203
-
SHA512
2b9198511065b00d6d1e191940032ef6ed4e7515feb93600c9d931581bb42fd32ad65a8d011768eae7bb7d39c7da8db4dd37156a0f6735471f93dea1f726244d
-
SSDEEP
3072:M6f6Om/aqS+akBBOk8evut5yWeFhqGcB0a/V1QmsbtJk5RQ5CeG:Lf6byVkBMt1RWZu5RQoF
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Control Panel\International\Geo\Nation lYsQMAcY.exe -
Deletes itself 1 IoCs
pid Process 2936 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2972 dOUEIcwQ.exe 2560 lYsQMAcY.exe -
Loads dropped DLL 20 IoCs
pid Process 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\dOUEIcwQ.exe = "C:\\Users\\Admin\\GeoIQEEA\\dOUEIcwQ.exe" dOUEIcwQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lYsQMAcY.exe = "C:\\ProgramData\\PSccoMMU\\lYsQMAcY.exe" lYsQMAcY.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\dOUEIcwQ.exe = "C:\\Users\\Admin\\GeoIQEEA\\dOUEIcwQ.exe" 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lYsQMAcY.exe = "C:\\ProgramData\\PSccoMMU\\lYsQMAcY.exe" 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1560 reg.exe 2192 reg.exe 2996 reg.exe 1580 reg.exe 2896 reg.exe 808 reg.exe 2148 reg.exe 1296 reg.exe 1052 reg.exe 840 reg.exe 292 reg.exe 3052 reg.exe 2712 reg.exe 2692 reg.exe 1748 reg.exe 2632 reg.exe 1040 reg.exe 1484 reg.exe 1788 reg.exe 2708 reg.exe 2612 reg.exe 2876 reg.exe 2628 reg.exe 2936 reg.exe 2520 reg.exe 2800 reg.exe 292 reg.exe 2216 reg.exe 1096 reg.exe 1352 reg.exe 2280 reg.exe 2808 reg.exe 1380 reg.exe 2952 reg.exe 2144 reg.exe 2612 reg.exe 2952 reg.exe 2316 reg.exe 1784 reg.exe 2232 reg.exe 1376 reg.exe 2412 reg.exe 1060 reg.exe 2272 reg.exe 2096 reg.exe 624 reg.exe 1472 reg.exe 1500 reg.exe 2200 reg.exe 2488 reg.exe 2592 reg.exe 528 reg.exe 2168 reg.exe 1700 reg.exe 1640 reg.exe 2628 reg.exe 1292 reg.exe 2404 reg.exe 948 reg.exe 1364 reg.exe 692 reg.exe 1816 reg.exe 2800 reg.exe 1796 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2792 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2792 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 736 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 736 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 572 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 572 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1044 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1044 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2292 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2292 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2496 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2496 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2948 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2948 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2904 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2904 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2244 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2244 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1480 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1480 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3068 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3068 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1636 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1636 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1740 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1740 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3060 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3060 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2896 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2896 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2336 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2336 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1992 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1992 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2036 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2036 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3040 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 3040 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1332 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1332 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1540 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1540 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 988 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 988 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2796 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2796 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1212 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1212 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 840 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 840 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2016 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2016 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 584 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 584 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1036 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 1036 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2124 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 2124 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 lYsQMAcY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe 2560 lYsQMAcY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2972 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 28 PID 2360 wrote to memory of 2972 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 28 PID 2360 wrote to memory of 2972 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 28 PID 2360 wrote to memory of 2972 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 28 PID 2360 wrote to memory of 2560 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 29 PID 2360 wrote to memory of 2560 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 29 PID 2360 wrote to memory of 2560 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 29 PID 2360 wrote to memory of 2560 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 29 PID 2360 wrote to memory of 2812 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 30 PID 2360 wrote to memory of 2812 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 30 PID 2360 wrote to memory of 2812 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 30 PID 2360 wrote to memory of 2812 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 30 PID 2812 wrote to memory of 2268 2812 cmd.exe 32 PID 2812 wrote to memory of 2268 2812 cmd.exe 32 PID 2812 wrote to memory of 2268 2812 cmd.exe 32 PID 2812 wrote to memory of 2268 2812 cmd.exe 32 PID 2360 wrote to memory of 2696 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 33 PID 2360 wrote to memory of 2696 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 33 PID 2360 wrote to memory of 2696 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 33 PID 2360 wrote to memory of 2696 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 33 PID 2360 wrote to memory of 2692 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 34 PID 2360 wrote to memory of 2692 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 34 PID 2360 wrote to memory of 2692 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 34 PID 2360 wrote to memory of 2692 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 34 PID 2360 wrote to memory of 2488 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 36 PID 2360 wrote to memory of 2488 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 36 PID 2360 wrote to memory of 2488 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 36 PID 2360 wrote to memory of 2488 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 36 PID 2360 wrote to memory of 2948 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 39 PID 2360 wrote to memory of 2948 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 39 PID 2360 wrote to memory of 2948 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 39 PID 2360 wrote to memory of 2948 2360 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 39 PID 2268 wrote to memory of 2752 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 42 PID 2268 wrote to memory of 2752 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 42 PID 2268 wrote to memory of 2752 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 42 PID 2268 wrote to memory of 2752 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 42 PID 2948 wrote to memory of 1804 2948 cmd.exe 41 PID 2948 wrote to memory of 1804 2948 cmd.exe 41 PID 2948 wrote to memory of 1804 2948 cmd.exe 41 PID 2948 wrote to memory of 1804 2948 cmd.exe 41 PID 2752 wrote to memory of 2792 2752 cmd.exe 44 PID 2752 wrote to memory of 2792 2752 cmd.exe 44 PID 2752 wrote to memory of 2792 2752 cmd.exe 44 PID 2752 wrote to memory of 2792 2752 cmd.exe 44 PID 2268 wrote to memory of 2804 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 45 PID 2268 wrote to memory of 2804 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 45 PID 2268 wrote to memory of 2804 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 45 PID 2268 wrote to memory of 2804 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 45 PID 2268 wrote to memory of 2664 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 46 PID 2268 wrote to memory of 2664 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 46 PID 2268 wrote to memory of 2664 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 46 PID 2268 wrote to memory of 2664 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 46 PID 2268 wrote to memory of 1580 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 47 PID 2268 wrote to memory of 1580 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 47 PID 2268 wrote to memory of 1580 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 47 PID 2268 wrote to memory of 1580 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 47 PID 2268 wrote to memory of 764 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 48 PID 2268 wrote to memory of 764 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 48 PID 2268 wrote to memory of 764 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 48 PID 2268 wrote to memory of 764 2268 2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe 48 PID 764 wrote to memory of 2260 764 cmd.exe 53 PID 764 wrote to memory of 2260 764 cmd.exe 53 PID 764 wrote to memory of 2260 764 cmd.exe 53 PID 764 wrote to memory of 2260 764 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\GeoIQEEA\dOUEIcwQ.exe"C:\Users\Admin\GeoIQEEA\dOUEIcwQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2972
-
-
C:\ProgramData\PSccoMMU\lYsQMAcY.exe"C:\ProgramData\PSccoMMU\lYsQMAcY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2560
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"6⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"8⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"10⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"12⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"14⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"16⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"18⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"20⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"22⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"24⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"26⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"28⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"30⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"32⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"34⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"36⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"38⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"40⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"42⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"44⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"46⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"48⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"50⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"52⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"54⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"56⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"58⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"60⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"62⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"64⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock65⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"66⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock67⤵PID:584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"68⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock69⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"70⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock71⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"72⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock73⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"74⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock75⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"76⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock77⤵PID:2468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"78⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock79⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"80⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock81⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"82⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock83⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"84⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock85⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"86⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock87⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"88⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock89⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"90⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock91⤵PID:292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"92⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock93⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"94⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock95⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"96⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock97⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"98⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock99⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"100⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock101⤵PID:804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"102⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock103⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"104⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock105⤵PID:2084
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"106⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock107⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"108⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock109⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"110⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock111⤵PID:1140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"112⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock113⤵PID:996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"114⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock115⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"116⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock117⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"118⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock119⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"120⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock121⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-16_a442929304394d9e6ccb16002e28fb8c_virlock"122⤵PID:1212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-