Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe
-
Size
162KB
-
MD5
262448a316a87d4cd3b4ea7e85aa99d8
-
SHA1
ae5d091ccbd3035154d31c6dffb68637d8f28c4b
-
SHA256
40cabae518946bc901a841461bb17db9c616d70a0478db64a2862094ed559a17
-
SHA512
bde88a718290ea9c0ed4dd1ae113397cbde66f565cf9f85baaa712e8ea898cbf925c33484042a34aa06e6f2a4dad9a580271b1dde2647974aad5d1481b1977e9
-
SSDEEP
3072:vqdolkw0toO5xXSuc/qm/iD7EsLZBkDu2j8wsuqC8UQ7pRT3ch8XhlZ0Ev2IG/+o:plBUZcoEsLzkDZ79qzUYNcqhlZdeIc8I
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Control Panel\International\Geo\Nation GyswIsIg.exe -
Deletes itself 1 IoCs
pid Process 2464 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1200 GyswIsIg.exe 2740 XmkMUwMk.exe -
Loads dropped DLL 20 IoCs
pid Process 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XmkMUwMk.exe = "C:\\ProgramData\\uYYgosks\\XmkMUwMk.exe" XmkMUwMk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\GyswIsIg.exe = "C:\\Users\\Admin\\lMEAccwI\\GyswIsIg.exe" 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XmkMUwMk.exe = "C:\\ProgramData\\uYYgosks\\XmkMUwMk.exe" 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\GyswIsIg.exe = "C:\\Users\\Admin\\lMEAccwI\\GyswIsIg.exe" GyswIsIg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico GyswIsIg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 988 reg.exe 2348 reg.exe 1800 reg.exe 2096 reg.exe 2616 reg.exe 2708 reg.exe 1460 reg.exe 2824 reg.exe 2376 reg.exe 1196 reg.exe 1224 reg.exe 2352 reg.exe 1336 reg.exe 2416 reg.exe 2804 reg.exe 1856 reg.exe 1048 reg.exe 2096 reg.exe 1788 reg.exe 2792 reg.exe 1612 reg.exe 2592 reg.exe 2964 reg.exe 564 reg.exe 1692 reg.exe 2784 reg.exe 560 reg.exe 1952 reg.exe 2700 reg.exe 1440 reg.exe 1648 reg.exe 276 reg.exe 2832 reg.exe 2172 reg.exe 2984 reg.exe 2808 reg.exe 1868 reg.exe 2192 reg.exe 1500 reg.exe 1260 reg.exe 2348 reg.exe 2904 reg.exe 2108 reg.exe 3044 reg.exe 1876 reg.exe 2500 reg.exe 2484 reg.exe 1988 reg.exe 1016 reg.exe 2136 reg.exe 2104 reg.exe 1132 reg.exe 2816 reg.exe 2904 reg.exe 2612 reg.exe 1840 reg.exe 1792 reg.exe 2660 reg.exe 2136 reg.exe 2988 reg.exe 668 reg.exe 2304 reg.exe 2064 reg.exe 2468 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2436 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2436 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1052 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1052 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2128 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2128 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2168 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2168 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1964 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1964 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2656 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2656 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2680 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2680 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2220 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2220 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 876 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 876 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1004 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1004 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 564 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 564 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1624 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1624 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2900 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2900 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1956 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1956 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 596 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 596 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1876 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1876 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2072 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2072 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2836 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2836 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2688 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2688 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2520 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2520 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1940 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1940 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2620 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2620 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1952 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1952 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2676 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2676 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2012 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2012 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1792 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1792 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2644 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2644 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2572 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 2572 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1864 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1864 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1936 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 1936 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1200 GyswIsIg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe 1200 GyswIsIg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2120 wrote to memory of 1200 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 28 PID 2120 wrote to memory of 1200 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 28 PID 2120 wrote to memory of 1200 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 28 PID 2120 wrote to memory of 1200 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 28 PID 2120 wrote to memory of 2740 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 29 PID 2120 wrote to memory of 2740 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 29 PID 2120 wrote to memory of 2740 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 29 PID 2120 wrote to memory of 2740 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 29 PID 2120 wrote to memory of 2660 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 30 PID 2120 wrote to memory of 2660 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 30 PID 2120 wrote to memory of 2660 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 30 PID 2120 wrote to memory of 2660 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 30 PID 2660 wrote to memory of 2584 2660 cmd.exe 32 PID 2660 wrote to memory of 2584 2660 cmd.exe 32 PID 2660 wrote to memory of 2584 2660 cmd.exe 32 PID 2660 wrote to memory of 2584 2660 cmd.exe 32 PID 2120 wrote to memory of 2468 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 33 PID 2120 wrote to memory of 2468 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 33 PID 2120 wrote to memory of 2468 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 33 PID 2120 wrote to memory of 2468 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 33 PID 2120 wrote to memory of 2824 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 34 PID 2120 wrote to memory of 2824 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 34 PID 2120 wrote to memory of 2824 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 34 PID 2120 wrote to memory of 2824 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 34 PID 2120 wrote to memory of 2620 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 36 PID 2120 wrote to memory of 2620 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 36 PID 2120 wrote to memory of 2620 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 36 PID 2120 wrote to memory of 2620 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 36 PID 2120 wrote to memory of 2572 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 39 PID 2120 wrote to memory of 2572 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 39 PID 2120 wrote to memory of 2572 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 39 PID 2120 wrote to memory of 2572 2120 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 39 PID 2572 wrote to memory of 2492 2572 cmd.exe 41 PID 2572 wrote to memory of 2492 2572 cmd.exe 41 PID 2572 wrote to memory of 2492 2572 cmd.exe 41 PID 2572 wrote to memory of 2492 2572 cmd.exe 41 PID 2584 wrote to memory of 1956 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 42 PID 2584 wrote to memory of 1956 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 42 PID 2584 wrote to memory of 1956 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 42 PID 2584 wrote to memory of 1956 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 42 PID 1956 wrote to memory of 2436 1956 cmd.exe 44 PID 1956 wrote to memory of 2436 1956 cmd.exe 44 PID 1956 wrote to memory of 2436 1956 cmd.exe 44 PID 1956 wrote to memory of 2436 1956 cmd.exe 44 PID 2584 wrote to memory of 2764 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 45 PID 2584 wrote to memory of 2764 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 45 PID 2584 wrote to memory of 2764 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 45 PID 2584 wrote to memory of 2764 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 45 PID 2584 wrote to memory of 2780 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 46 PID 2584 wrote to memory of 2780 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 46 PID 2584 wrote to memory of 2780 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 46 PID 2584 wrote to memory of 2780 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 46 PID 2584 wrote to memory of 2744 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 47 PID 2584 wrote to memory of 2744 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 47 PID 2584 wrote to memory of 2744 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 47 PID 2584 wrote to memory of 2744 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 47 PID 2584 wrote to memory of 2720 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 48 PID 2584 wrote to memory of 2720 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 48 PID 2584 wrote to memory of 2720 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 48 PID 2584 wrote to memory of 2720 2584 2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe 48 PID 2720 wrote to memory of 1980 2720 cmd.exe 53 PID 2720 wrote to memory of 1980 2720 cmd.exe 53 PID 2720 wrote to memory of 1980 2720 cmd.exe 53 PID 2720 wrote to memory of 1980 2720 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\lMEAccwI\GyswIsIg.exe"C:\Users\Admin\lMEAccwI\GyswIsIg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1200
-
-
C:\ProgramData\uYYgosks\XmkMUwMk.exe"C:\ProgramData\uYYgosks\XmkMUwMk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2740
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"6⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"8⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"10⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"12⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"14⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"16⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"18⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"20⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"22⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"24⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"26⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"28⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"30⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"32⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"34⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"36⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"38⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"40⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"42⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"44⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"46⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"48⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"50⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"52⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"54⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"56⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"58⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"60⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"62⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"64⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock65⤵PID:2700
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"66⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock67⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"68⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock69⤵PID:2264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"70⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock71⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"72⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock73⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"74⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock75⤵PID:972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"76⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock77⤵PID:1252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"78⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock79⤵PID:2052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"80⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock81⤵PID:1016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"82⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock83⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"84⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock85⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"86⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock87⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"88⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock89⤵PID:1648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"90⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock91⤵PID:2832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"92⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock93⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"94⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock95⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"96⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock97⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"98⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock99⤵PID:708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"100⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock101⤵PID:2244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"102⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock103⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"104⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock105⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"106⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock107⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"108⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock109⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"110⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock111⤵PID:1372
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"112⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock113⤵PID:1164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"114⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock115⤵PID:1452
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"116⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock117⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"118⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock119⤵PID:536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"120⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock121⤵PID:2000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_262448a316a87d4cd3b4ea7e85aa99d8_virlock"122⤵PID:1052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-