Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
-
Size
235KB
-
MD5
09bf3f42a75392e9189c3c525d2d73b4
-
SHA1
a7b823440b5ac4a29f4e7a879d206a5afe122392
-
SHA256
b0060eb3e956e601273b46efb59ae907457df14bece47eb63399ce361ce80966
-
SHA512
60e0e8e4598f32b70f21633ba6bc9eaeaa11c59b9f5bd024cea4f306c4270d003d0890a0d62e36edf41db99fac7ecb0d0ce21508da7d89f8145d96689180aa13
-
SSDEEP
3072:ZaNQ+911lN+qSVi1gzyD5H+XVgWrjFyNPJLZCeA1q/Oo2Yisga0/Gwj93J0yiUAn:klGqHqe4SAZedMN82Y+a05j932h3VEvE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 54 3904 sihclient.exe 58 3904 sihclient.exe 60 3904 sihclient.exe 62 3904 sihclient.exe 64 3904 sihclient.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation okMMAQsY.exe -
Executes dropped EXE 2 IoCs
pid Process 4592 kIQooYMc.exe 1812 okMMAQsY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IuYkAAMs.exe = "C:\\ProgramData\\QoAcQAYk\\IuYkAAMs.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kIQooYMc.exe = "C:\\Users\\Admin\\USgcsckc\\kIQooYMc.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\okMMAQsY.exe = "C:\\ProgramData\\cWcYAgkU\\okMMAQsY.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\okMMAQsY.exe = "C:\\ProgramData\\cWcYAgkU\\okMMAQsY.exe" okMMAQsY.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kIQooYMc.exe = "C:\\Users\\Admin\\USgcsckc\\kIQooYMc.exe" kIQooYMc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tqAEEAQs.exe = "C:\\Users\\Admin\\miEIIAgk\\tqAEEAQs.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe okMMAQsY.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe okMMAQsY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5008 1352 WerFault.exe 1024 2568 3968 WerFault.exe 1025 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 396 reg.exe 8 reg.exe 1600 reg.exe 872 reg.exe 3412 Process not Found 2208 reg.exe 4016 reg.exe 2040 reg.exe 1896 reg.exe 3864 reg.exe 3668 reg.exe 4908 reg.exe 2624 reg.exe 4976 reg.exe 4600 reg.exe 3844 reg.exe 2432 reg.exe 4208 reg.exe 2132 reg.exe 3120 reg.exe 3364 reg.exe 1772 reg.exe 3364 Process not Found 1948 Process not Found 4692 reg.exe 5008 reg.exe 2892 reg.exe 1612 reg.exe 5016 Process not Found 4904 reg.exe 4700 reg.exe 4740 reg.exe 4588 reg.exe 1892 reg.exe 1584 reg.exe 1612 reg.exe 2336 Process not Found 1480 reg.exe 8 reg.exe 3952 reg.exe 3316 reg.exe 4864 reg.exe 5108 Process not Found 5104 reg.exe 4900 reg.exe 4620 reg.exe 2480 reg.exe 1568 reg.exe 1256 reg.exe 4744 reg.exe 2988 reg.exe 1036 reg.exe 1892 reg.exe 2680 reg.exe 1384 reg.exe 2248 reg.exe 3696 reg.exe 4564 reg.exe 4616 reg.exe 4900 Process not Found 3384 reg.exe 1600 reg.exe 644 reg.exe 1524 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1832 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1832 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1832 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1832 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1528 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1528 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1528 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1528 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3948 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3948 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3948 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3948 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1892 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1892 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1892 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1892 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4748 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4748 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4748 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4748 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2208 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2208 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2208 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2208 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 704 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 704 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 704 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 704 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1680 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1680 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1680 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1680 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4084 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4084 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4084 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4084 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1544 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1544 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1544 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1544 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4348 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4348 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4348 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 4348 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1812 okMMAQsY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe 1812 okMMAQsY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4592 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 87 PID 1176 wrote to memory of 4592 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 87 PID 1176 wrote to memory of 4592 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 87 PID 1176 wrote to memory of 1812 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 88 PID 1176 wrote to memory of 1812 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 88 PID 1176 wrote to memory of 1812 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 88 PID 1176 wrote to memory of 2484 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 89 PID 1176 wrote to memory of 2484 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 89 PID 1176 wrote to memory of 2484 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 89 PID 1176 wrote to memory of 5112 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 91 PID 1176 wrote to memory of 5112 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 91 PID 1176 wrote to memory of 5112 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 91 PID 1176 wrote to memory of 2472 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 92 PID 1176 wrote to memory of 2472 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 92 PID 1176 wrote to memory of 2472 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 92 PID 1176 wrote to memory of 1952 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 93 PID 1176 wrote to memory of 1952 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 93 PID 1176 wrote to memory of 1952 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 93 PID 1176 wrote to memory of 4368 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 94 PID 1176 wrote to memory of 4368 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 94 PID 1176 wrote to memory of 4368 1176 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 94 PID 2484 wrote to memory of 2776 2484 cmd.exe 99 PID 2484 wrote to memory of 2776 2484 cmd.exe 99 PID 2484 wrote to memory of 2776 2484 cmd.exe 99 PID 4368 wrote to memory of 3296 4368 cmd.exe 100 PID 4368 wrote to memory of 3296 4368 cmd.exe 100 PID 4368 wrote to memory of 3296 4368 cmd.exe 100 PID 2776 wrote to memory of 704 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 101 PID 2776 wrote to memory of 704 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 101 PID 2776 wrote to memory of 704 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 101 PID 704 wrote to memory of 4684 704 cmd.exe 103 PID 704 wrote to memory of 4684 704 cmd.exe 103 PID 704 wrote to memory of 4684 704 cmd.exe 103 PID 2776 wrote to memory of 3384 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 105 PID 2776 wrote to memory of 3384 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 105 PID 2776 wrote to memory of 3384 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 105 PID 2776 wrote to memory of 4904 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 106 PID 2776 wrote to memory of 4904 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 106 PID 2776 wrote to memory of 4904 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 106 PID 2776 wrote to memory of 2584 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 107 PID 2776 wrote to memory of 2584 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 107 PID 2776 wrote to memory of 2584 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 107 PID 2776 wrote to memory of 4240 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 108 PID 2776 wrote to memory of 4240 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 108 PID 2776 wrote to memory of 4240 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 108 PID 4240 wrote to memory of 1188 4240 cmd.exe 113 PID 4240 wrote to memory of 1188 4240 cmd.exe 113 PID 4240 wrote to memory of 1188 4240 cmd.exe 113 PID 4684 wrote to memory of 1084 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 114 PID 4684 wrote to memory of 1084 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 114 PID 4684 wrote to memory of 1084 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 114 PID 1084 wrote to memory of 4412 1084 cmd.exe 116 PID 1084 wrote to memory of 4412 1084 cmd.exe 116 PID 1084 wrote to memory of 4412 1084 cmd.exe 116 PID 4684 wrote to memory of 1236 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 117 PID 4684 wrote to memory of 1236 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 117 PID 4684 wrote to memory of 1236 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 117 PID 4684 wrote to memory of 3148 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 118 PID 4684 wrote to memory of 3148 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 118 PID 4684 wrote to memory of 3148 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 118 PID 4684 wrote to memory of 3096 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 119 PID 4684 wrote to memory of 3096 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 119 PID 4684 wrote to memory of 3096 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 119 PID 4684 wrote to memory of 3020 4684 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\USgcsckc\kIQooYMc.exe"C:\Users\Admin\USgcsckc\kIQooYMc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4592
-
-
C:\ProgramData\cWcYAgkU\okMMAQsY.exe"C:\ProgramData\cWcYAgkU\okMMAQsY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"8⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"10⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"12⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"14⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"16⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"18⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"20⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"22⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"24⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"26⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"28⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"30⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"32⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock33⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"34⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock35⤵PID:1772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"36⤵PID:616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock37⤵PID:2068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"38⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock39⤵PID:4620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"40⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock41⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"42⤵PID:3984
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock43⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"44⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock45⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"46⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock47⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"48⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock49⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"50⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock51⤵PID:736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"52⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock53⤵PID:1384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"54⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock55⤵PID:2028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"56⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock57⤵PID:1988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"58⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock59⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"60⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock61⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"62⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock63⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"64⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock65⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"66⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock67⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"68⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock69⤵PID:1356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"70⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock71⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"72⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock73⤵PID:3452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"74⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock75⤵PID:1740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"76⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock77⤵PID:4368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"78⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock79⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"80⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock81⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"82⤵PID:4164
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock83⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"84⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock85⤵PID:3160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"86⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock87⤵PID:3844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"88⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock89⤵PID:2480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"90⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock91⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"92⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock93⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"94⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock95⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"96⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock97⤵PID:4172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"98⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock99⤵PID:996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"100⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock101⤵PID:3864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"102⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock103⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"104⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock105⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"106⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock107⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"108⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock109⤵PID:2812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"110⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock111⤵PID:2852
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"112⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock113⤵PID:3648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"114⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock115⤵PID:3304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"116⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock117⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"118⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock119⤵PID:2432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"120⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock121⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"122⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-