Analysis
-
max time kernel
150s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 12:36
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe
-
Size
186KB
-
MD5
68671bda5a8af1e69521590614c39b61
-
SHA1
ee94523f75c634471eeb8481a5c0db64d27b18fa
-
SHA256
f3be1b2fa58fca1e478d18c992d3261566350f392bdd813eaa63f8265304e4c7
-
SHA512
47f7c6ebee835c06aa324a66bf740fb77b4d7a040d4cbc9a8ec916e1f9b01cdfc5f463943546bbb6f46285d73bfadee901912ca1302d02a0a0d7d55ea50abf5e
-
SSDEEP
3072:gRQcGe0ul4OJ2mzmlTGtas1Q1XPNQGKNl0XWq4/eU5XbM3cOpzs6l2+wRm4fkuZt:gRYe0Wx2Emlatas1Q1XPNQGKNl0XWq49
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (79) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qsAccgUI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation qsAccgUI.exe -
Executes dropped EXE 2 IoCs
Processes:
qsAccgUI.exeNmoUEcgU.exepid process 3840 qsAccgUI.exe 3700 NmoUEcgU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeqsAccgUI.exeNmoUEcgU.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\oOokkMkc.exe = "C:\\ProgramData\\sCQIAkgA\\oOokkMkc.exe" 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qsAccgUI.exe = "C:\\Users\\Admin\\gmEEUsAM\\qsAccgUI.exe" 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NmoUEcgU.exe = "C:\\ProgramData\\zosooQgk\\NmoUEcgU.exe" 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qsAccgUI.exe = "C:\\Users\\Admin\\gmEEUsAM\\qsAccgUI.exe" qsAccgUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NmoUEcgU.exe = "C:\\ProgramData\\zosooQgk\\NmoUEcgU.exe" NmoUEcgU.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XQwQssUE.exe = "C:\\Users\\Admin\\ugsokQMc\\XQwQssUE.exe" 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2236 2836 WerFault.exe XQwQssUE.exe 3924 2496 WerFault.exe oOokkMkc.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4912 reg.exe 2172 reg.exe 1680 reg.exe 4308 reg.exe 4932 reg.exe 1264 4356 reg.exe 3000 reg.exe 3168 4200 4592 reg.exe 3464 reg.exe 2788 reg.exe 5036 reg.exe 2852 reg.exe 3980 reg.exe 1364 reg.exe 916 reg.exe 4856 reg.exe 2228 reg.exe 3440 reg.exe 3792 reg.exe 4632 reg.exe 4440 reg.exe 3792 reg.exe 916 reg.exe 1940 reg.exe 1264 reg.exe 2124 reg.exe 680 reg.exe 2096 reg.exe 4932 reg.exe 3672 reg.exe 2800 reg.exe 5096 reg.exe 4144 reg.exe 3956 reg.exe 428 reg.exe 2112 2216 reg.exe 2368 reg.exe 4728 2032 464 reg.exe 3900 reg.exe 1388 reg.exe 4752 reg.exe 4716 reg.exe 992 3228 4488 4576 2380 reg.exe 3552 reg.exe 4476 reg.exe 2016 reg.exe 3048 reg.exe 2116 reg.exe 2136 reg.exe 1040 reg.exe 3928 reg.exe 1584 reg.exe 4792 reg.exe 4576 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exepid process 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3668 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3668 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3668 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3668 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1556 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1556 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1556 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1556 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2872 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2872 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2872 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2872 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3464 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3464 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3464 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 3464 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1824 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1824 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1824 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1824 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2672 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2672 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2672 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2672 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4924 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4924 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4924 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4924 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2496 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2496 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2496 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 2496 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 816 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 816 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 816 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 816 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 5056 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 5056 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 5056 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 5056 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1612 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1612 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1612 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 1612 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4208 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4208 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4208 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe 4208 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
qsAccgUI.exepid process 3840 qsAccgUI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
qsAccgUI.exepid process 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe 3840 qsAccgUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.execmd.execmd.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.execmd.execmd.exe2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.execmd.exedescription pid process target process PID 1592 wrote to memory of 3840 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe qsAccgUI.exe PID 1592 wrote to memory of 3840 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe qsAccgUI.exe PID 1592 wrote to memory of 3840 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe qsAccgUI.exe PID 1592 wrote to memory of 3700 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe NmoUEcgU.exe PID 1592 wrote to memory of 3700 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe NmoUEcgU.exe PID 1592 wrote to memory of 3700 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe NmoUEcgU.exe PID 1592 wrote to memory of 3948 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1592 wrote to memory of 3948 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1592 wrote to memory of 3948 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 3948 wrote to memory of 428 3948 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 3948 wrote to memory of 428 3948 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 3948 wrote to memory of 428 3948 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 1592 wrote to memory of 2116 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 2116 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 2116 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4656 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4656 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4656 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4636 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4636 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4636 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 1592 wrote to memory of 4912 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1592 wrote to memory of 4912 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1592 wrote to memory of 4912 1592 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 4912 wrote to memory of 2972 4912 cmd.exe cscript.exe PID 4912 wrote to memory of 2972 4912 cmd.exe cscript.exe PID 4912 wrote to memory of 2972 4912 cmd.exe cscript.exe PID 428 wrote to memory of 1364 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 428 wrote to memory of 1364 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 428 wrote to memory of 1364 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1364 wrote to memory of 3956 1364 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 1364 wrote to memory of 3956 1364 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 1364 wrote to memory of 3956 1364 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 428 wrote to memory of 212 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 212 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 212 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 4064 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 4064 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 4064 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 3564 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 3564 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 3564 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 428 wrote to memory of 3916 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 428 wrote to memory of 3916 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 428 wrote to memory of 3916 428 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 3916 wrote to memory of 4832 3916 cmd.exe cscript.exe PID 3916 wrote to memory of 4832 3916 cmd.exe cscript.exe PID 3916 wrote to memory of 4832 3916 cmd.exe cscript.exe PID 3956 wrote to memory of 1824 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 3956 wrote to memory of 1824 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 3956 wrote to memory of 1824 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe PID 1824 wrote to memory of 2956 1824 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 1824 wrote to memory of 2956 1824 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 1824 wrote to memory of 2956 1824 cmd.exe 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe PID 3956 wrote to memory of 1584 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 1584 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 1584 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 3080 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 3080 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 3080 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 4356 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 4356 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 4356 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe reg.exe PID 3956 wrote to memory of 4216 3956 2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\gmEEUsAM\qsAccgUI.exe"C:\Users\Admin\gmEEUsAM\qsAccgUI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3840 -
C:\ProgramData\zosooQgk\NmoUEcgU.exe"C:\ProgramData\zosooQgk\NmoUEcgU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"8⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"10⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"12⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"14⤵PID:3380
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"16⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"18⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"20⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"22⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"24⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"26⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"28⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"30⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"32⤵PID:3648
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock33⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"34⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock35⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"36⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock37⤵PID:3232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"38⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock39⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"40⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock41⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"42⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock43⤵PID:3900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"44⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock45⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"46⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock47⤵PID:1032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"48⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock49⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"50⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock51⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"52⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock53⤵PID:5056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"54⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock55⤵PID:4560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"56⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock57⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"58⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock59⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"60⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock61⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"62⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock63⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"64⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock65⤵PID:5068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"66⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock67⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"68⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock69⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"70⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock71⤵PID:3284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"72⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock73⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"74⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock75⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"76⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock77⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"78⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock79⤵PID:1328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"80⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock81⤵PID:4512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"82⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock83⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"84⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock85⤵PID:2232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"86⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock87⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"88⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock89⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"90⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock91⤵PID:4448
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"92⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock93⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"94⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock95⤵PID:2840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"96⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock97⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"98⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock99⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"100⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock101⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"102⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock103⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"104⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock105⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"106⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock107⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"108⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock109⤵PID:388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"110⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock111⤵PID:2324
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"112⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock113⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"114⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock115⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"116⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock117⤵PID:3648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"118⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock119⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"120⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock121⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"122⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock123⤵PID:3572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"124⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock125⤵PID:4828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"126⤵PID:3272
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock127⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"128⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock129⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"130⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock131⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"132⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock133⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"134⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock135⤵PID:1196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"136⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock137⤵PID:4308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"138⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock139⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"140⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock141⤵PID:408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"142⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock143⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"144⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock145⤵PID:3528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"146⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock147⤵PID:2116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"148⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock149⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"150⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock151⤵PID:3124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"152⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock153⤵PID:716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"154⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock155⤵PID:1212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"156⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock157⤵PID:1584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"158⤵PID:512
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock159⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"160⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock161⤵PID:3168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"162⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock163⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"164⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock165⤵PID:3640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"166⤵PID:4336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1167⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock167⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"168⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock169⤵PID:4984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"170⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock171⤵PID:4516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"172⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock173⤵PID:2408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"174⤵PID:2216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock175⤵PID:972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"176⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock177⤵PID:3688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"178⤵PID:1344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock179⤵PID:1188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"180⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock181⤵PID:3956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"182⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock183⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"184⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock185⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"186⤵PID:3988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1187⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock187⤵PID:4100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"188⤵PID:4648
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock189⤵PID:312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"190⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock191⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"192⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock193⤵PID:392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"194⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock195⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"196⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock197⤵PID:4332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"198⤵PID:636
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1199⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock199⤵PID:3408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"200⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock201⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"202⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock203⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"204⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock205⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"206⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock207⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"208⤵PID:1196
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1209⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock209⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"210⤵PID:1584
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1211⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock211⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"212⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock213⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"214⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock215⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"216⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock217⤵PID:3928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"218⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock219⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"220⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock221⤵PID:2552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"222⤵PID:4292
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1223⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock223⤵PID:1348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"224⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock225⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"226⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock227⤵PID:2820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"228⤵PID:3016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1229⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock229⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"230⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock231⤵PID:1336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"232⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock233⤵PID:3460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"234⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock235⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"236⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock237⤵PID:4416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"238⤵PID:2132
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1239⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock239⤵PID:4808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"240⤵PID:4660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1241⤵PID:3316
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock241⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_68671bda5a8af1e69521590614c39b61_virlock"242⤵PID:916