Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2024 10:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe
Resource
win10v2004-20240419-en
General
-
Target
2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe
-
Size
138KB
-
MD5
098aadf85c858488724f397b9b78a4b7
-
SHA1
4391c6b5c084e3f614b3c5a39f3f70b0b96eb4d0
-
SHA256
7f836e9c2aa331198d13ccf65eda775fb4c6c24a6363e476cf652e9d2051e22c
-
SHA512
585fb69e90f9d562fe9fc7c53bb72c0b73ac978a10307793d2d1b36b9bd7b1f0e324de69a3f26d2dbda2fb2031e61898ad6471524b884e49889aebeee79f39ff
-
SSDEEP
3072:o3OS4GfRRJNTkhg8gbgwhMsen3do87x1cI:op4GfRN4hg8gfMje87Z
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (90) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation kMgUYgYI.exe -
Executes dropped EXE 2 IoCs
pid Process 2308 vUwIksUs.exe 4912 kMgUYgYI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vUwIksUs.exe = "C:\\Users\\Admin\\aSIAUQME\\vUwIksUs.exe" 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kMgUYgYI.exe = "C:\\ProgramData\\VmoIcEck\\kMgUYgYI.exe" 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vUwIksUs.exe = "C:\\Users\\Admin\\aSIAUQME\\vUwIksUs.exe" vUwIksUs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\kMgUYgYI.exe = "C:\\ProgramData\\VmoIcEck\\kMgUYgYI.exe" kMgUYgYI.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe kMgUYgYI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4428 reg.exe 4804 reg.exe 1432 reg.exe 4844 reg.exe 3120 reg.exe 4532 reg.exe 648 reg.exe 3144 reg.exe 1224 reg.exe 4800 reg.exe 3528 reg.exe 448 reg.exe 2344 reg.exe 2504 reg.exe 4464 reg.exe 3904 reg.exe 436 reg.exe 1272 reg.exe 4880 reg.exe 2896 reg.exe 556 reg.exe 2004 reg.exe 3156 reg.exe 3388 reg.exe 3920 reg.exe 3120 reg.exe 3688 reg.exe 376 reg.exe 2372 reg.exe 4012 reg.exe 2920 reg.exe 4468 reg.exe 5016 reg.exe 244 reg.exe 4488 reg.exe 1124 reg.exe 928 reg.exe 376 reg.exe 3592 reg.exe 3596 reg.exe 1968 reg.exe 2964 reg.exe 3132 reg.exe 5060 reg.exe 4200 reg.exe 3920 reg.exe 2668 reg.exe 116 reg.exe 4856 reg.exe 2600 reg.exe 4764 reg.exe 1560 reg.exe 1224 reg.exe 2484 reg.exe 3648 reg.exe 2072 reg.exe 644 reg.exe 1800 reg.exe 3316 reg.exe 4336 reg.exe 3688 reg.exe 532 reg.exe 1396 reg.exe 2368 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4984 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4984 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4984 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4984 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3672 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3672 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3672 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3672 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3124 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3124 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3124 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3124 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1256 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1256 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1256 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1256 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1576 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1576 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1576 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1576 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4896 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4896 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4896 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4896 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4716 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4716 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4716 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 4716 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 964 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 964 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 964 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 964 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2448 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2448 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2448 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2448 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3144 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3144 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3144 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 3144 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1632 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1632 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1632 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 1632 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2560 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2560 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2560 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 2560 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4912 kMgUYgYI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe 4912 kMgUYgYI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 2308 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 84 PID 4548 wrote to memory of 2308 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 84 PID 4548 wrote to memory of 2308 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 84 PID 4548 wrote to memory of 4912 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 85 PID 4548 wrote to memory of 4912 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 85 PID 4548 wrote to memory of 4912 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 85 PID 4548 wrote to memory of 3196 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 87 PID 4548 wrote to memory of 3196 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 87 PID 4548 wrote to memory of 3196 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 87 PID 4548 wrote to memory of 1596 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 89 PID 4548 wrote to memory of 1596 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 89 PID 4548 wrote to memory of 1596 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 89 PID 4548 wrote to memory of 748 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 90 PID 4548 wrote to memory of 748 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 90 PID 4548 wrote to memory of 748 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 90 PID 4548 wrote to memory of 3388 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 91 PID 4548 wrote to memory of 3388 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 91 PID 4548 wrote to memory of 3388 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 91 PID 4548 wrote to memory of 1488 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 92 PID 4548 wrote to memory of 1488 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 92 PID 4548 wrote to memory of 1488 4548 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 92 PID 1488 wrote to memory of 1496 1488 cmd.exe 97 PID 1488 wrote to memory of 1496 1488 cmd.exe 97 PID 1488 wrote to memory of 1496 1488 cmd.exe 97 PID 3196 wrote to memory of 4300 3196 cmd.exe 98 PID 3196 wrote to memory of 4300 3196 cmd.exe 98 PID 3196 wrote to memory of 4300 3196 cmd.exe 98 PID 4300 wrote to memory of 1492 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 100 PID 4300 wrote to memory of 1492 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 100 PID 4300 wrote to memory of 1492 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 100 PID 1492 wrote to memory of 4840 1492 cmd.exe 102 PID 1492 wrote to memory of 4840 1492 cmd.exe 102 PID 1492 wrote to memory of 4840 1492 cmd.exe 102 PID 4300 wrote to memory of 1324 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 103 PID 4300 wrote to memory of 1324 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 103 PID 4300 wrote to memory of 1324 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 103 PID 4300 wrote to memory of 4800 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 104 PID 4300 wrote to memory of 4800 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 104 PID 4300 wrote to memory of 4800 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 104 PID 4300 wrote to memory of 2748 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 105 PID 4300 wrote to memory of 2748 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 105 PID 4300 wrote to memory of 2748 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 105 PID 4300 wrote to memory of 4200 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 106 PID 4300 wrote to memory of 4200 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 106 PID 4300 wrote to memory of 4200 4300 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 106 PID 4200 wrote to memory of 2880 4200 cmd.exe 111 PID 4200 wrote to memory of 2880 4200 cmd.exe 111 PID 4200 wrote to memory of 2880 4200 cmd.exe 111 PID 4840 wrote to memory of 1936 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 112 PID 4840 wrote to memory of 1936 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 112 PID 4840 wrote to memory of 1936 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 112 PID 1936 wrote to memory of 4984 1936 cmd.exe 114 PID 1936 wrote to memory of 4984 1936 cmd.exe 114 PID 1936 wrote to memory of 4984 1936 cmd.exe 114 PID 4840 wrote to memory of 4748 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 115 PID 4840 wrote to memory of 4748 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 115 PID 4840 wrote to memory of 4748 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 115 PID 4840 wrote to memory of 436 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 116 PID 4840 wrote to memory of 436 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 116 PID 4840 wrote to memory of 436 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 116 PID 4840 wrote to memory of 4464 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 117 PID 4840 wrote to memory of 4464 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 117 PID 4840 wrote to memory of 4464 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 117 PID 4840 wrote to memory of 884 4840 2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\aSIAUQME\vUwIksUs.exe"C:\Users\Admin\aSIAUQME\vUwIksUs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2308
-
-
C:\ProgramData\VmoIcEck\kMgUYgYI.exe"C:\ProgramData\VmoIcEck\kMgUYgYI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"8⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"10⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"12⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"14⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"16⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"18⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"20⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"22⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"24⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"26⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"28⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"30⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"32⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock33⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"34⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock35⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"36⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock37⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"38⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock39⤵PID:812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"40⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock41⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"42⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock43⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"44⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock45⤵PID:3012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"46⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock47⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"48⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock49⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"50⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock51⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"52⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock53⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"54⤵PID:244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock55⤵PID:3280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"56⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock57⤵PID:596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"58⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock59⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"60⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock61⤵PID:2892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"62⤵PID:1872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock63⤵PID:812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"64⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock65⤵PID:3320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"66⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock67⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"68⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock69⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"70⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock71⤵PID:1496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"72⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock73⤵PID:1136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"74⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock75⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"76⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock77⤵PID:1608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"78⤵PID:452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:3188
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock79⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"80⤵PID:4524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock81⤵PID:4260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"82⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock83⤵PID:4496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"84⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock85⤵PID:1888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"86⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock87⤵PID:3528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"88⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock89⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"90⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock91⤵PID:2092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"92⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock93⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"94⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock95⤵PID:1452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"96⤵PID:4980
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV197⤵PID:5028
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock97⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"98⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock99⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"100⤵PID:1020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:3864
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock101⤵PID:4152
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"102⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock103⤵PID:4972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"104⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock105⤵PID:960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"106⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock107⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"108⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock109⤵PID:5080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"110⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock111⤵PID:2976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"112⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock113⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"114⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock115⤵PID:2880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"116⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock117⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"118⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock119⤵PID:2368
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"120⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock121⤵PID:3760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-05_098aadf85c858488724f397b9b78a4b7_virlock"122⤵PID:3796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-