Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe
-
Size
111KB
-
MD5
cf79f1139e7ea8dc69a0d4201056367e
-
SHA1
fb5f77751cdaab99fa462db4a8ec802947ff3e64
-
SHA256
758b5ff52d62f1a2410eb2025dd119e4a6828d2f44e02741165820e66374ca0c
-
SHA512
1cce2b955e76f564029b0f76745bc850b594d31ba4619b4a4c46670e7d753a212ccc8f13bd3e486bebb431fc601fcdbd145719ce9a2963fb21799a361bd72566
-
SSDEEP
3072:msiuaIALGwtDb8oNTQOIt+MpR5GdlHoW8AyzFuWszUIvM:NiurAxDbHNsfpbGPoVA3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation iqYYUIQk.exe -
Executes dropped EXE 2 IoCs
pid Process 1796 iqYYUIQk.exe 1412 uWQYUwAg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iqYYUIQk.exe = "C:\\Users\\Admin\\pyMwUIAQ\\iqYYUIQk.exe" 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uWQYUwAg.exe = "C:\\ProgramData\\YWwQosMk\\uWQYUwAg.exe" 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iqYYUIQk.exe = "C:\\Users\\Admin\\pyMwUIAQ\\iqYYUIQk.exe" iqYYUIQk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\uWQYUwAg.exe = "C:\\ProgramData\\YWwQosMk\\uWQYUwAg.exe" uWQYUwAg.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe iqYYUIQk.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe iqYYUIQk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1000 reg.exe 2244 reg.exe 2036 reg.exe 2108 reg.exe 1420 reg.exe 740 reg.exe 1172 reg.exe 1356 reg.exe 1972 reg.exe 4048 reg.exe 4692 reg.exe 1912 reg.exe 3144 reg.exe 3204 reg.exe 1604 reg.exe 3148 reg.exe 2024 reg.exe 5080 reg.exe 4588 reg.exe 1040 reg.exe 4532 reg.exe 840 reg.exe 4548 reg.exe 3108 reg.exe 4928 reg.exe 3736 reg.exe 5060 reg.exe 4756 reg.exe 4680 reg.exe 5040 reg.exe 3712 reg.exe 1720 reg.exe 2764 reg.exe 4004 reg.exe 3144 reg.exe 2720 reg.exe 880 reg.exe 2788 reg.exe 1040 reg.exe 2784 reg.exe 5044 reg.exe 1104 reg.exe 4680 reg.exe 3504 reg.exe 3452 reg.exe 2936 reg.exe 4336 reg.exe 3168 reg.exe 1492 reg.exe 3984 reg.exe 1180 reg.exe 2952 reg.exe 2400 reg.exe 2720 reg.exe 4972 reg.exe 4592 reg.exe 2484 reg.exe 2736 reg.exe 2172 reg.exe 1444 reg.exe 1880 reg.exe 1604 reg.exe 4176 reg.exe 1364 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4820 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4820 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4820 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4820 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 1908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 1908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 1908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 1908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3776 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3776 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3776 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3776 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 5080 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 5080 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 5080 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 5080 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3244 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3244 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3244 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 3244 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 740 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 740 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 740 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 740 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2520 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2520 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2520 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2520 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4548 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4548 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4548 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4548 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4176 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4176 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4176 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4176 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2964 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2964 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2964 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2964 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4568 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4568 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4568 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4568 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4584 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4584 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4584 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 4584 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2948 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2948 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2948 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 2948 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1796 iqYYUIQk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe 1796 iqYYUIQk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3908 wrote to memory of 1796 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 86 PID 3908 wrote to memory of 1796 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 86 PID 3908 wrote to memory of 1796 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 86 PID 3908 wrote to memory of 1412 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 87 PID 3908 wrote to memory of 1412 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 87 PID 3908 wrote to memory of 1412 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 87 PID 3908 wrote to memory of 4112 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 88 PID 3908 wrote to memory of 4112 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 88 PID 3908 wrote to memory of 4112 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 88 PID 4112 wrote to memory of 2264 4112 cmd.exe 90 PID 4112 wrote to memory of 2264 4112 cmd.exe 90 PID 4112 wrote to memory of 2264 4112 cmd.exe 90 PID 3908 wrote to memory of 1196 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 91 PID 3908 wrote to memory of 1196 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 91 PID 3908 wrote to memory of 1196 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 91 PID 3908 wrote to memory of 2924 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 92 PID 3908 wrote to memory of 2924 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 92 PID 3908 wrote to memory of 2924 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 92 PID 3908 wrote to memory of 540 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 93 PID 3908 wrote to memory of 540 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 93 PID 3908 wrote to memory of 540 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 93 PID 3908 wrote to memory of 1008 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 94 PID 3908 wrote to memory of 1008 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 94 PID 3908 wrote to memory of 1008 3908 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 94 PID 1008 wrote to memory of 4344 1008 cmd.exe 99 PID 1008 wrote to memory of 4344 1008 cmd.exe 99 PID 1008 wrote to memory of 4344 1008 cmd.exe 99 PID 2264 wrote to memory of 3484 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 101 PID 2264 wrote to memory of 3484 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 101 PID 2264 wrote to memory of 3484 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 101 PID 3484 wrote to memory of 3532 3484 cmd.exe 103 PID 3484 wrote to memory of 3532 3484 cmd.exe 103 PID 3484 wrote to memory of 3532 3484 cmd.exe 103 PID 2264 wrote to memory of 2244 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 104 PID 2264 wrote to memory of 2244 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 104 PID 2264 wrote to memory of 2244 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 104 PID 2264 wrote to memory of 5060 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 105 PID 2264 wrote to memory of 5060 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 105 PID 2264 wrote to memory of 5060 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 105 PID 2264 wrote to memory of 1304 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 106 PID 2264 wrote to memory of 1304 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 106 PID 2264 wrote to memory of 1304 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 106 PID 2264 wrote to memory of 1588 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 107 PID 2264 wrote to memory of 1588 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 107 PID 2264 wrote to memory of 1588 2264 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 107 PID 1588 wrote to memory of 4692 1588 cmd.exe 112 PID 1588 wrote to memory of 4692 1588 cmd.exe 112 PID 1588 wrote to memory of 4692 1588 cmd.exe 112 PID 3532 wrote to memory of 1948 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 113 PID 3532 wrote to memory of 1948 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 113 PID 3532 wrote to memory of 1948 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 113 PID 1948 wrote to memory of 4820 1948 cmd.exe 115 PID 1948 wrote to memory of 4820 1948 cmd.exe 115 PID 1948 wrote to memory of 4820 1948 cmd.exe 115 PID 3532 wrote to memory of 3984 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 116 PID 3532 wrote to memory of 3984 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 116 PID 3532 wrote to memory of 3984 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 116 PID 3532 wrote to memory of 2604 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 117 PID 3532 wrote to memory of 2604 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 117 PID 3532 wrote to memory of 2604 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 117 PID 3532 wrote to memory of 4352 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 118 PID 3532 wrote to memory of 4352 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 118 PID 3532 wrote to memory of 4352 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 118 PID 3532 wrote to memory of 3136 3532 2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\pyMwUIAQ\iqYYUIQk.exe"C:\Users\Admin\pyMwUIAQ\iqYYUIQk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1796
-
-
C:\ProgramData\YWwQosMk\uWQYUwAg.exe"C:\ProgramData\YWwQosMk\uWQYUwAg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1412
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"8⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"10⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"12⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"14⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"16⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"18⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"20⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"22⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"24⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"26⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"28⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"30⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"32⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock33⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"34⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock35⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"36⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock37⤵PID:1056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"38⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock39⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"40⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock41⤵PID:4252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"42⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock43⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"44⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock45⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"46⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock47⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"48⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock49⤵PID:1696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"50⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock51⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"52⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock53⤵PID:3300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"54⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock55⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"56⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock57⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"58⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock59⤵PID:1416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"60⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock61⤵PID:3656
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"62⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock63⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"64⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock65⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"66⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock67⤵PID:1484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"68⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock69⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"70⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock71⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"72⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock73⤵PID:1488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"74⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock75⤵PID:5060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"76⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock77⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"78⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock79⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"80⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock81⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"82⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock83⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"84⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock85⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"86⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock87⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"88⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock89⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"90⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock91⤵PID:3672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"92⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock93⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"94⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock95⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"96⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock97⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"98⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock99⤵PID:3908
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"100⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock101⤵PID:1696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"102⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock103⤵PID:692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"104⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock105⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"106⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock107⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"108⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock109⤵PID:4756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"110⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock111⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"112⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock113⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"114⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock115⤵PID:3776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"116⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock117⤵PID:4536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"118⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock119⤵PID:64
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"120⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock121⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-21_cf79f1139e7ea8dc69a0d4201056367e_virlock"122⤵PID:408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-