Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe
-
Size
196KB
-
MD5
7c0591bb11e45afbd3ddd4521ca46791
-
SHA1
59b5453b71086aeaf1012f45d335374a2f13133c
-
SHA256
ae4cfb406afe9f575189804fde9c3abef45fa5020398938529fe17c9ec66daf3
-
SHA512
c9418951b095241926f048768de341035e8ed84c1a4cb644f450201baa7861cfb68f0d759e14e353f5deb37104b12aa64ded777da37b1aadf690a1f44a4b243b
-
SSDEEP
6144:sRBqTFl1qQ1K0+V6SW5pY8i3ktNoz0ul:8qjwQ1K0XektN+0u
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation NkgkMsUs.exe -
Executes dropped EXE 2 IoCs
pid Process 2832 NkgkMsUs.exe 3420 SmYQoEAE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NkgkMsUs.exe = "C:\\Users\\Admin\\bgsoEcUE\\NkgkMsUs.exe" 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SmYQoEAE.exe = "C:\\ProgramData\\kYAocoAI\\SmYQoEAE.exe" 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NkgkMsUs.exe = "C:\\Users\\Admin\\bgsoEcUE\\NkgkMsUs.exe" NkgkMsUs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SmYQoEAE.exe = "C:\\ProgramData\\kYAocoAI\\SmYQoEAE.exe" SmYQoEAE.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe NkgkMsUs.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe NkgkMsUs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2396 reg.exe 4880 reg.exe 3832 reg.exe 4320 reg.exe 4064 reg.exe 1552 reg.exe 4296 reg.exe 4348 reg.exe 4960 reg.exe 4416 reg.exe 4316 reg.exe 3648 reg.exe 2360 reg.exe 388 reg.exe 452 reg.exe 628 reg.exe 2224 reg.exe 3552 reg.exe 436 reg.exe 2008 reg.exe 4304 reg.exe 5000 reg.exe 3804 reg.exe 2876 reg.exe 2976 reg.exe 4468 Process not Found 3644 Process not Found 3740 Process not Found 2828 Process not Found 4440 reg.exe 3352 reg.exe 4560 reg.exe 1160 reg.exe 1180 reg.exe 4080 reg.exe 1592 reg.exe 2372 reg.exe 2448 reg.exe 3436 Process not Found 3000 reg.exe 680 reg.exe 4980 Process not Found 508 reg.exe 4228 reg.exe 4512 reg.exe 1348 reg.exe 1784 reg.exe 4356 reg.exe 1964 reg.exe 3080 Process not Found 1948 reg.exe 1444 reg.exe 1372 reg.exe 4448 reg.exe 3932 Process not Found 4760 reg.exe 1488 reg.exe 4608 reg.exe 3372 reg.exe 1364 Process not Found 1316 reg.exe 2020 reg.exe 2828 reg.exe 4324 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3740 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3740 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3740 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3740 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5116 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5116 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5116 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 5116 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1212 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1212 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1212 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1212 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4976 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4976 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4976 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4976 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4912 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4912 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4912 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4912 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1068 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1068 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1068 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1068 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 856 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 856 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 856 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 856 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 404 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 404 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 404 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 404 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3084 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3084 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3084 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 3084 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 4060 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1016 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1016 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1016 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 1016 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2252 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2252 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2252 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 2252 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 NkgkMsUs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe 2832 NkgkMsUs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2832 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 84 PID 2560 wrote to memory of 2832 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 84 PID 2560 wrote to memory of 2832 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 84 PID 2560 wrote to memory of 3420 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 85 PID 2560 wrote to memory of 3420 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 85 PID 2560 wrote to memory of 3420 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 85 PID 2560 wrote to memory of 2424 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 86 PID 2560 wrote to memory of 2424 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 86 PID 2560 wrote to memory of 2424 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 86 PID 2424 wrote to memory of 5100 2424 cmd.exe 88 PID 2424 wrote to memory of 5100 2424 cmd.exe 88 PID 2424 wrote to memory of 5100 2424 cmd.exe 88 PID 2560 wrote to memory of 4256 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 89 PID 2560 wrote to memory of 4256 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 89 PID 2560 wrote to memory of 4256 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 89 PID 2560 wrote to memory of 2800 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 90 PID 2560 wrote to memory of 2800 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 90 PID 2560 wrote to memory of 2800 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 90 PID 2560 wrote to memory of 1492 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 91 PID 2560 wrote to memory of 1492 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 91 PID 2560 wrote to memory of 1492 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 91 PID 2560 wrote to memory of 1920 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 93 PID 2560 wrote to memory of 1920 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 93 PID 2560 wrote to memory of 1920 2560 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 93 PID 5100 wrote to memory of 2532 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 97 PID 5100 wrote to memory of 2532 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 97 PID 5100 wrote to memory of 2532 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 97 PID 1920 wrote to memory of 2740 1920 cmd.exe 98 PID 1920 wrote to memory of 2740 1920 cmd.exe 98 PID 1920 wrote to memory of 2740 1920 cmd.exe 98 PID 2532 wrote to memory of 2360 2532 cmd.exe 100 PID 2532 wrote to memory of 2360 2532 cmd.exe 100 PID 2532 wrote to memory of 2360 2532 cmd.exe 100 PID 5100 wrote to memory of 1260 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 101 PID 5100 wrote to memory of 1260 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 101 PID 5100 wrote to memory of 1260 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 101 PID 5100 wrote to memory of 920 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 102 PID 5100 wrote to memory of 920 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 102 PID 5100 wrote to memory of 920 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 102 PID 5100 wrote to memory of 4304 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 103 PID 5100 wrote to memory of 4304 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 103 PID 5100 wrote to memory of 4304 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 103 PID 5100 wrote to memory of 3112 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 104 PID 5100 wrote to memory of 3112 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 104 PID 5100 wrote to memory of 3112 5100 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 104 PID 3112 wrote to memory of 2256 3112 cmd.exe 109 PID 3112 wrote to memory of 2256 3112 cmd.exe 109 PID 3112 wrote to memory of 2256 3112 cmd.exe 109 PID 2360 wrote to memory of 1316 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 110 PID 2360 wrote to memory of 1316 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 110 PID 2360 wrote to memory of 1316 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 110 PID 1316 wrote to memory of 3740 1316 cmd.exe 112 PID 1316 wrote to memory of 3740 1316 cmd.exe 112 PID 1316 wrote to memory of 3740 1316 cmd.exe 112 PID 2360 wrote to memory of 4668 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 113 PID 2360 wrote to memory of 4668 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 113 PID 2360 wrote to memory of 4668 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 113 PID 2360 wrote to memory of 744 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 114 PID 2360 wrote to memory of 744 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 114 PID 2360 wrote to memory of 744 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 114 PID 2360 wrote to memory of 936 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 115 PID 2360 wrote to memory of 936 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 115 PID 2360 wrote to memory of 936 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 115 PID 2360 wrote to memory of 876 2360 2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\bgsoEcUE\NkgkMsUs.exe"C:\Users\Admin\bgsoEcUE\NkgkMsUs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2832
-
-
C:\ProgramData\kYAocoAI\SmYQoEAE.exe"C:\ProgramData\kYAocoAI\SmYQoEAE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3420
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"8⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"10⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"12⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"14⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"16⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"18⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"20⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"22⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"24⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"26⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"28⤵PID:4756
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"30⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"32⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock33⤵PID:696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"34⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock35⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"36⤵PID:5068
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock37⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"38⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock39⤵PID:984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"40⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock41⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"42⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock43⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"44⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock45⤵PID:4072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"46⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock47⤵PID:2016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"48⤵PID:1468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4256
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock49⤵PID:4676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"50⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock51⤵PID:2064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"52⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock53⤵PID:2560
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"54⤵PID:1920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:4064
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock55⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"56⤵PID:4480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:1896
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock57⤵PID:3652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"58⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock59⤵PID:1900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"60⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock61⤵PID:948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"62⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock63⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"64⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock65⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"66⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock67⤵PID:1712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"68⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock69⤵PID:216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"70⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock71⤵PID:3468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"72⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock73⤵PID:1832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"74⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock75⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"76⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock77⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"78⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock79⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"80⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock81⤵PID:1460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"82⤵PID:2020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock83⤵PID:4348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"84⤵PID:2716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:1056
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock85⤵PID:964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"86⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock87⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"88⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock89⤵PID:3832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"90⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock91⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"92⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock93⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"94⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock95⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"96⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock97⤵PID:376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"98⤵PID:3080
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock99⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"100⤵PID:1144
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:4996
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock101⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"102⤵PID:4556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock103⤵PID:1040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"104⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock105⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"106⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock107⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"108⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock109⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"110⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock111⤵PID:2924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"112⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock113⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"114⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock115⤵PID:4812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"116⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock117⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"118⤵PID:4464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock119⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"120⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock121⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-10_7c0591bb11e45afbd3ddd4521ca46791_virlock"122⤵PID:4348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-