Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 21:40
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe
-
Size
206KB
-
MD5
603265859f744615bb91f46a55c837ef
-
SHA1
3092544ff20a4dfbc93b9f40df451b0530921e42
-
SHA256
99bd1785216647cb7ae901102b93771477fd8659027902cd769c2c5a75490645
-
SHA512
b8aca8d07f5997f5d527ab88521fa8d5ab1db52318e8b12ad08e0a8e9e111c64e7b995b29f263259eda16c82cf046335cc49be5e3d4b7f0151932f1b1d650f30
-
SSDEEP
3072:ZarrtQNBGldrMfEU+l9Srlru/k1Za42DeH/gF34qCfEmMuv+QUkC6BM6a/:srrtQizrY8aoHV4vJ5veMM6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation buYYUgYg.exe -
Executes dropped EXE 2 IoCs
pid Process 1052 buYYUgYg.exe 3820 GEMooIEk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GEMooIEk.exe = "C:\\ProgramData\\lYkUYocs\\GEMooIEk.exe" 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buYYUgYg.exe = "C:\\Users\\Admin\\DCgQUEcg\\buYYUgYg.exe" buYYUgYg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\GEMooIEk.exe = "C:\\ProgramData\\lYkUYocs\\GEMooIEk.exe" GEMooIEk.exe Set value (str) \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\buYYUgYg.exe = "C:\\Users\\Admin\\DCgQUEcg\\buYYUgYg.exe" 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe buYYUgYg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2212 reg.exe 4712 reg.exe 4448 reg.exe 4656 reg.exe 4404 reg.exe 1020 reg.exe 532 Process not Found 3640 Process not Found 4936 reg.exe 5036 reg.exe 2468 reg.exe 3212 reg.exe 3016 reg.exe 868 reg.exe 1988 Process not Found 2596 reg.exe 4196 reg.exe 5040 Process not Found 4036 reg.exe 928 Process not Found 512 Process not Found 2192 reg.exe 3208 reg.exe 4352 reg.exe 3384 reg.exe 4872 reg.exe 1652 reg.exe 4920 reg.exe 4872 Process not Found 320 reg.exe 3960 reg.exe 4424 reg.exe 964 reg.exe 3900 reg.exe 2008 reg.exe 3416 Process not Found 2884 reg.exe 5040 reg.exe 4984 reg.exe 4920 reg.exe 2044 reg.exe 4048 Process not Found 5036 reg.exe 4680 reg.exe 4344 reg.exe 2760 reg.exe 4276 reg.exe 3948 Process not Found 3640 reg.exe 620 reg.exe 2984 reg.exe 1196 reg.exe 1228 reg.exe 5068 reg.exe 3628 Process not Found 1608 reg.exe 3716 reg.exe 4236 reg.exe 2156 Process not Found 4400 reg.exe 4468 reg.exe 4892 reg.exe 684 reg.exe 2380 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3172 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3172 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3172 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3172 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4712 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4712 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4712 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4712 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4572 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4572 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4572 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4572 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3664 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3664 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3664 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 3664 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5020 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5020 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5020 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5020 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1636 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1636 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1636 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1636 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1176 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1176 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1176 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 1176 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4292 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4404 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4404 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4404 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4404 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5068 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5068 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5068 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 5068 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2896 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2896 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2896 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 2896 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4624 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4624 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4624 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 4624 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1052 buYYUgYg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe 1052 buYYUgYg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1052 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 83 PID 2928 wrote to memory of 1052 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 83 PID 2928 wrote to memory of 1052 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 83 PID 2928 wrote to memory of 3820 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 84 PID 2928 wrote to memory of 3820 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 84 PID 2928 wrote to memory of 3820 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 84 PID 2928 wrote to memory of 3416 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 85 PID 2928 wrote to memory of 3416 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 85 PID 2928 wrote to memory of 3416 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 85 PID 3416 wrote to memory of 376 3416 cmd.exe 87 PID 3416 wrote to memory of 376 3416 cmd.exe 87 PID 3416 wrote to memory of 376 3416 cmd.exe 87 PID 2928 wrote to memory of 540 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 88 PID 2928 wrote to memory of 540 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 88 PID 2928 wrote to memory of 540 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 88 PID 2928 wrote to memory of 3372 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 89 PID 2928 wrote to memory of 3372 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 89 PID 2928 wrote to memory of 3372 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 89 PID 2928 wrote to memory of 5036 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 90 PID 2928 wrote to memory of 5036 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 90 PID 2928 wrote to memory of 5036 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 90 PID 2928 wrote to memory of 2424 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 91 PID 2928 wrote to memory of 2424 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 91 PID 2928 wrote to memory of 2424 2928 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 91 PID 2424 wrote to memory of 1512 2424 cmd.exe 96 PID 2424 wrote to memory of 1512 2424 cmd.exe 96 PID 2424 wrote to memory of 1512 2424 cmd.exe 96 PID 376 wrote to memory of 4108 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 97 PID 376 wrote to memory of 4108 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 97 PID 376 wrote to memory of 4108 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 97 PID 376 wrote to memory of 3948 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 99 PID 376 wrote to memory of 3948 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 99 PID 376 wrote to memory of 3948 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 99 PID 376 wrote to memory of 1912 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 100 PID 376 wrote to memory of 1912 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 100 PID 376 wrote to memory of 1912 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 100 PID 376 wrote to memory of 2900 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 101 PID 376 wrote to memory of 2900 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 101 PID 376 wrote to memory of 2900 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 101 PID 376 wrote to memory of 4552 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 102 PID 376 wrote to memory of 4552 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 102 PID 376 wrote to memory of 4552 376 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 102 PID 4108 wrote to memory of 5080 4108 cmd.exe 107 PID 4108 wrote to memory of 5080 4108 cmd.exe 107 PID 4108 wrote to memory of 5080 4108 cmd.exe 107 PID 4552 wrote to memory of 3668 4552 cmd.exe 108 PID 4552 wrote to memory of 3668 4552 cmd.exe 108 PID 4552 wrote to memory of 3668 4552 cmd.exe 108 PID 5080 wrote to memory of 4044 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 109 PID 5080 wrote to memory of 4044 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 109 PID 5080 wrote to memory of 4044 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 109 PID 4044 wrote to memory of 3172 4044 cmd.exe 111 PID 4044 wrote to memory of 3172 4044 cmd.exe 111 PID 4044 wrote to memory of 3172 4044 cmd.exe 111 PID 5080 wrote to memory of 3288 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 112 PID 5080 wrote to memory of 3288 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 112 PID 5080 wrote to memory of 3288 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 112 PID 5080 wrote to memory of 4312 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 113 PID 5080 wrote to memory of 4312 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 113 PID 5080 wrote to memory of 4312 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 113 PID 5080 wrote to memory of 4560 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 114 PID 5080 wrote to memory of 4560 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 114 PID 5080 wrote to memory of 4560 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 114 PID 5080 wrote to memory of 2120 5080 2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\DCgQUEcg\buYYUgYg.exe"C:\Users\Admin\DCgQUEcg\buYYUgYg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1052
-
-
C:\ProgramData\lYkUYocs\GEMooIEk.exe"C:\ProgramData\lYkUYocs\GEMooIEk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"8⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"10⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"12⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"14⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"16⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"18⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"20⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"22⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"24⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"26⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"28⤵PID:4528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"30⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"32⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock33⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"34⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock35⤵PID:4704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"36⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock37⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"38⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock39⤵PID:620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"40⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock41⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"42⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock43⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"44⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock45⤵PID:4380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"46⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock47⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"48⤵PID:4052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock49⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"50⤵PID:2596
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock51⤵PID:820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"52⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock53⤵PID:2400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"54⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock55⤵PID:4060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"56⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock57⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"58⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock59⤵PID:820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"60⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock61⤵PID:3664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"62⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock63⤵PID:1236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"64⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock65⤵PID:3032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"66⤵PID:3324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock67⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"68⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock69⤵PID:1480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"70⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock71⤵PID:736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"72⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock73⤵PID:4444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"74⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock75⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"76⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock77⤵PID:4848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"78⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock79⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"80⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock81⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"82⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock83⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"84⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock85⤵PID:1616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"86⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock87⤵PID:3284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"88⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock89⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"90⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock91⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"92⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock93⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"94⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock95⤵PID:2732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"96⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock97⤵PID:732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"98⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock99⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"100⤵PID:4480
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock101⤵PID:3372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"102⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock103⤵PID:3212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"104⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock105⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"106⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock107⤵PID:3268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"108⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock109⤵PID:4476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"110⤵PID:3220
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:1336
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock111⤵PID:3696
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"112⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock113⤵PID:2492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"114⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock115⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"116⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock117⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"118⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock119⤵PID:3288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"120⤵PID:4856
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock121⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-22_603265859f744615bb91f46a55c837ef_virlock"122⤵PID:3020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-