Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 10:38
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe
-
Size
117KB
-
MD5
7f7f8daffd0393693e67969ab2723f0c
-
SHA1
ca2c0fcc4d37f0eb37179fcb1acb448da024269c
-
SHA256
5a0630b5158d1cf91a46ae0ec99ccb8d1983eb3070b7c422bc31a75be9af3940
-
SHA512
e550dc22ff11820d7a02f8e50cb91afeae3fa0b46669e6a31aa00d3901309faad6d53afad79be9270df50a42e013373d76910d1463b770a09d881bcbb0379dba
-
SSDEEP
1536:cVpMBh63xyp6UE7e/MUVv+stPTfe8XSJbOfef0fbfufZfvfNf3f/EcQz7q9zmo3q:K2hWyp6UMUh+MbfeYv7qJmQwJwMp5Kq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jAUUwosk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation jAUUwosk.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1624 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
jAUUwosk.exeAeMQQccw.exepid process 2296 jAUUwosk.exe 2004 AeMQQccw.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exejAUUwosk.exepid process 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exejAUUwosk.exeAeMQQccw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AeMQQccw.exe = "C:\\ProgramData\\kioAgEQo\\AeMQQccw.exe" 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jAUUwosk.exe = "C:\\Users\\Admin\\SCoosIIM\\jAUUwosk.exe" jAUUwosk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AeMQQccw.exe = "C:\\ProgramData\\kioAgEQo\\AeMQQccw.exe" AeMQQccw.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\jAUUwosk.exe = "C:\\Users\\Admin\\SCoosIIM\\jAUUwosk.exe" 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe -
Drops file in Windows directory 1 IoCs
Processes:
jAUUwosk.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico jAUUwosk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1724 reg.exe 1680 reg.exe 584 reg.exe 780 reg.exe 1252 reg.exe 2728 reg.exe 1264 reg.exe 2404 reg.exe 2736 reg.exe 1708 reg.exe 2388 reg.exe 2812 reg.exe 2440 reg.exe 404 reg.exe 1408 reg.exe 2176 reg.exe 2748 reg.exe 1196 reg.exe 704 reg.exe 2524 reg.exe 2784 reg.exe 1560 reg.exe 2884 reg.exe 384 reg.exe 2620 reg.exe 2136 reg.exe 1036 reg.exe 2976 reg.exe 1612 reg.exe 620 reg.exe 1196 reg.exe 836 reg.exe 1260 reg.exe 1612 reg.exe 2120 reg.exe 2108 reg.exe 2088 reg.exe 1660 reg.exe 2752 reg.exe 1652 reg.exe 2036 reg.exe 2644 reg.exe 2680 reg.exe 2788 reg.exe 2812 reg.exe 1440 reg.exe 2340 reg.exe 1704 reg.exe 2996 reg.exe 2020 reg.exe 2412 reg.exe 2124 reg.exe 2388 reg.exe 1620 reg.exe 1388 reg.exe 2092 reg.exe 2100 reg.exe 2252 reg.exe 2396 reg.exe 704 reg.exe 3060 reg.exe 756 reg.exe 588 reg.exe 1408 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exepid process 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2264 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2264 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2840 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2840 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1996 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1996 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 960 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 960 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 880 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 880 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2596 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2596 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2800 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2800 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2952 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2952 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1380 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1380 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 900 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 900 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 764 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 764 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2324 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2324 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2812 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2812 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2992 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2992 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 536 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 536 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1308 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1308 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1704 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1704 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2784 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2784 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2740 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2740 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 572 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 572 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1260 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1260 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 480 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 480 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2508 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2508 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2552 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2552 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1196 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1196 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1528 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1528 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1444 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1444 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1408 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 1408 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 360 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 360 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2088 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe 2088 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
jAUUwosk.exepid process 2296 jAUUwosk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
jAUUwosk.exepid process 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe 2296 jAUUwosk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.execmd.execmd.exe2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.execmd.execmd.exedescription pid process target process PID 384 wrote to memory of 2296 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe jAUUwosk.exe PID 384 wrote to memory of 2296 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe jAUUwosk.exe PID 384 wrote to memory of 2296 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe jAUUwosk.exe PID 384 wrote to memory of 2296 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe jAUUwosk.exe PID 384 wrote to memory of 2004 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe AeMQQccw.exe PID 384 wrote to memory of 2004 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe AeMQQccw.exe PID 384 wrote to memory of 2004 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe AeMQQccw.exe PID 384 wrote to memory of 2004 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe AeMQQccw.exe PID 384 wrote to memory of 2556 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2556 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2556 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2556 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2556 wrote to memory of 2652 2556 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2556 wrote to memory of 2652 2556 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2556 wrote to memory of 2652 2556 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2556 wrote to memory of 2652 2556 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 384 wrote to memory of 2576 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2576 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2576 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2576 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2584 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2584 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2584 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2584 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2860 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2860 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2860 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2860 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 384 wrote to memory of 2824 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2824 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2824 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 384 wrote to memory of 2824 384 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2824 wrote to memory of 2508 2824 cmd.exe cscript.exe PID 2824 wrote to memory of 2508 2824 cmd.exe cscript.exe PID 2824 wrote to memory of 2508 2824 cmd.exe cscript.exe PID 2824 wrote to memory of 2508 2824 cmd.exe cscript.exe PID 2652 wrote to memory of 2496 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2496 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2496 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2496 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2496 wrote to memory of 2264 2496 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2496 wrote to memory of 2264 2496 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2496 wrote to memory of 2264 2496 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2496 wrote to memory of 2264 2496 cmd.exe 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe PID 2652 wrote to memory of 2792 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2792 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2792 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2792 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2796 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2796 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2796 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2796 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2812 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2812 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2812 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2812 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe reg.exe PID 2652 wrote to memory of 2980 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2980 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2980 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2652 wrote to memory of 2980 2652 2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe cmd.exe PID 2980 wrote to memory of 1432 2980 cmd.exe cscript.exe PID 2980 wrote to memory of 1432 2980 cmd.exe cscript.exe PID 2980 wrote to memory of 1432 2980 cmd.exe cscript.exe PID 2980 wrote to memory of 1432 2980 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\SCoosIIM\jAUUwosk.exe"C:\Users\Admin\SCoosIIM\jAUUwosk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2296
-
-
C:\ProgramData\kioAgEQo\AeMQQccw.exe"C:\ProgramData\kioAgEQo\AeMQQccw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2004
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"6⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"10⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"12⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"14⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"16⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"18⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"20⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"22⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"24⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"26⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2324 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"28⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"30⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"32⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"34⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"36⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"38⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"40⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"42⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"44⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"46⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"48⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"50⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"52⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"54⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"56⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"58⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"60⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:360 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"62⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"64⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock65⤵PID:1016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"66⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock67⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"68⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock69⤵PID:1988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"70⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock71⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"72⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock73⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"74⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock75⤵PID:2904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"76⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock77⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"78⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock79⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"80⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock81⤵PID:2684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"82⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock83⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"84⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock85⤵PID:2608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"86⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock87⤵PID:1272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"88⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock89⤵PID:1996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"90⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock91⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"92⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock93⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"94⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock95⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"96⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock97⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"98⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock99⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"100⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock101⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"102⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock103⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"104⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock105⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"106⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock107⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"108⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock109⤵PID:1096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"110⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock111⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"112⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock113⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"114⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock115⤵PID:2896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"116⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock117⤵PID:676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"118⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock119⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"120⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock121⤵PID:2880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_7f7f8daffd0393693e67969ab2723f0c_virlock"122⤵PID:3036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-