Analysis
-
max time kernel
150s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
202405223f0c845467b75b09102609b7a2c31b50virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
202405223f0c845467b75b09102609b7a2c31b50virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
202405223f0c845467b75b09102609b7a2c31b50virlock.exe
-
Size
185KB
-
MD5
3f0c845467b75b09102609b7a2c31b50
-
SHA1
69d96b9d5bf8e47550541158ab94d3fc498a6b61
-
SHA256
f9c0068ff988ec359ed3da3c6e4910302b9b50cf5e4cfbb512f8ef57f90d581e
-
SHA512
345184fa284c0f9abb9ffd22e21e541313cef3bccb6bb9fc75e589c4c0aaa66cddfd0546e9e4015a0c0dbb4837135f6bfa6fac28437098741f2a43ab1cf28c01
-
SSDEEP
3072:cVaq5FcYT5BbZYP/6pfVSSsORkMaibfpKG/7Qx0KgxGdjNuGtb/j4bljcEhk4Bm9:ufz5pZYPypff7tjxojI43ohk4
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (78) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mqAMUEAc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation mqAMUEAc.exe -
Executes dropped EXE 2 IoCs
Processes:
mqAMUEAc.exenScUEswE.exepid process 3608 mqAMUEAc.exe 1664 nScUEswE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
202405223f0c845467b75b09102609b7a2c31b50virlock.exemqAMUEAc.exenScUEswE.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mqAMUEAc.exe = "C:\\Users\\Admin\\xyQQUAUc\\mqAMUEAc.exe" 202405223f0c845467b75b09102609b7a2c31b50virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nScUEswE.exe = "C:\\ProgramData\\bygIowMc\\nScUEswE.exe" 202405223f0c845467b75b09102609b7a2c31b50virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mqAMUEAc.exe = "C:\\Users\\Admin\\xyQQUAUc\\mqAMUEAc.exe" mqAMUEAc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nScUEswE.exe = "C:\\ProgramData\\bygIowMc\\nScUEswE.exe" nScUEswE.exe -
Drops file in System32 directory 1 IoCs
Processes:
mqAMUEAc.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe mqAMUEAc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4240 reg.exe 4484 reg.exe 692 reg.exe 1908 reg.exe 4492 reg.exe 4712 reg.exe 1920 4204 reg.exe 2424 reg.exe 3212 reg.exe 764 reg.exe 2976 reg.exe 2668 reg.exe 2476 reg.exe 1268 reg.exe 3384 reg.exe 2780 reg.exe 1856 reg.exe 4220 reg.exe 4452 reg.exe 2804 reg.exe 5116 reg.exe 432 reg.exe 2200 reg.exe 1612 reg.exe 4324 reg.exe 3260 reg.exe 4704 2176 reg.exe 1488 reg.exe 2200 reg.exe 3584 reg.exe 2140 reg.exe 2140 reg.exe 4344 reg.exe 3260 reg.exe 3632 reg.exe 4372 reg.exe 1908 reg.exe 1796 4528 reg.exe 3476 reg.exe 4368 reg.exe 3420 reg.exe 4528 reg.exe 5100 reg.exe 3148 4888 reg.exe 2468 reg.exe 364 reg.exe 4440 reg.exe 1280 reg.exe 3416 4240 reg.exe 2852 reg.exe 3476 reg.exe 1996 reg.exe 4472 reg.exe 4440 reg.exe 3028 reg.exe 1980 2140 reg.exe 4788 reg.exe 2404 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exe202405223f0c845467b75b09102609b7a2c31b50virlock.exepid process 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4472 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4472 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4472 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4472 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4424 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4424 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4424 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4424 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2948 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2948 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2948 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2948 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4888 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4888 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4888 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4888 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 208 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 208 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 208 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 208 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5092 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5092 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5092 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5092 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4084 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4084 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4084 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4084 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3784 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3784 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3784 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3784 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4636 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4636 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4636 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 4636 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 1412 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 1412 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 1412 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 1412 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2164 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2164 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2164 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 2164 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3116 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3116 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3116 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 3116 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5104 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5104 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5104 202405223f0c845467b75b09102609b7a2c31b50virlock.exe 5104 202405223f0c845467b75b09102609b7a2c31b50virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
mqAMUEAc.exepid process 3608 mqAMUEAc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
mqAMUEAc.exepid process 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe 3608 mqAMUEAc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
202405223f0c845467b75b09102609b7a2c31b50virlock.execmd.exe202405223f0c845467b75b09102609b7a2c31b50virlock.execmd.execmd.execmd.exe202405223f0c845467b75b09102609b7a2c31b50virlock.execmd.exedescription pid process target process PID 2872 wrote to memory of 3608 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe mqAMUEAc.exe PID 2872 wrote to memory of 3608 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe mqAMUEAc.exe PID 2872 wrote to memory of 3608 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe mqAMUEAc.exe PID 2872 wrote to memory of 1664 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe nScUEswE.exe PID 2872 wrote to memory of 1664 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe nScUEswE.exe PID 2872 wrote to memory of 1664 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe nScUEswE.exe PID 2872 wrote to memory of 4128 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 2872 wrote to memory of 4128 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 2872 wrote to memory of 4128 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 4128 wrote to memory of 60 4128 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 4128 wrote to memory of 60 4128 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 4128 wrote to memory of 60 4128 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 2872 wrote to memory of 4888 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 4888 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 4888 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 400 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 400 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 400 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 4756 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 4756 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 4756 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 2872 wrote to memory of 3168 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 2872 wrote to memory of 3168 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 2872 wrote to memory of 3168 2872 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 60 wrote to memory of 1888 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 60 wrote to memory of 1888 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 60 wrote to memory of 1888 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 3168 wrote to memory of 3472 3168 cmd.exe cscript.exe PID 3168 wrote to memory of 3472 3168 cmd.exe cscript.exe PID 3168 wrote to memory of 3472 3168 cmd.exe cscript.exe PID 1888 wrote to memory of 3500 1888 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 1888 wrote to memory of 3500 1888 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 1888 wrote to memory of 3500 1888 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 60 wrote to memory of 4384 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 4384 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 4384 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2200 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2200 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2200 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2404 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2404 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 2404 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 60 wrote to memory of 3340 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 60 wrote to memory of 3340 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 60 wrote to memory of 3340 60 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 3340 wrote to memory of 3148 3340 cmd.exe cscript.exe PID 3340 wrote to memory of 3148 3340 cmd.exe cscript.exe PID 3340 wrote to memory of 3148 3340 cmd.exe cscript.exe PID 3500 wrote to memory of 3200 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 3500 wrote to memory of 3200 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 3500 wrote to memory of 3200 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe PID 3200 wrote to memory of 4472 3200 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 3200 wrote to memory of 4472 3200 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 3200 wrote to memory of 4472 3200 cmd.exe 202405223f0c845467b75b09102609b7a2c31b50virlock.exe PID 3500 wrote to memory of 2476 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 2476 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 2476 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 4540 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 4540 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 4540 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe reg.exe PID 3500 wrote to memory of 2124 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe Conhost.exe PID 3500 wrote to memory of 2124 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe Conhost.exe PID 3500 wrote to memory of 2124 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe Conhost.exe PID 3500 wrote to memory of 4304 3500 202405223f0c845467b75b09102609b7a2c31b50virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exe"C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\xyQQUAUc\mqAMUEAc.exe"C:\Users\Admin\xyQQUAUc\mqAMUEAc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3608
-
-
C:\ProgramData\bygIowMc\nScUEswE.exe"C:\ProgramData\bygIowMc\nScUEswE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"8⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"10⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"12⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"14⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"16⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"18⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"20⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"22⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"24⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"26⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"28⤵PID:5096
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"30⤵PID:3680
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"32⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock33⤵PID:1056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"34⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock35⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"36⤵PID:2696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock37⤵PID:3964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"38⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock39⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"40⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock41⤵PID:4804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"42⤵PID:5072
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock43⤵PID:3876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"44⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock45⤵PID:3984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"46⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock47⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"48⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock49⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"50⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock51⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"52⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock53⤵PID:392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"54⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock55⤵PID:4472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"56⤵PID:540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV157⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock57⤵PID:516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"58⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock59⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"60⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock61⤵PID:2876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"62⤵PID:4356
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock63⤵PID:528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"64⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock65⤵PID:1124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"66⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock67⤵PID:672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"68⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock69⤵PID:712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"70⤵PID:4748
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock71⤵PID:4968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"72⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock73⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"74⤵PID:672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:1940
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock75⤵PID:4332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"76⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock77⤵PID:5020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"78⤵PID:1928
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock79⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"80⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock81⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"82⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock83⤵PID:4276
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"84⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock85⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"86⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock87⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"88⤵PID:740
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:5100
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock89⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"90⤵PID:5104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:1396
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock91⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"92⤵PID:3168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:1124
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock93⤵PID:364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"94⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock95⤵PID:2476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"96⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock97⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"98⤵PID:528
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock99⤵PID:2416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"100⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock101⤵PID:3016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"102⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock103⤵PID:4880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"104⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock105⤵PID:736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"106⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock107⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"108⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock109⤵PID:3280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"110⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock111⤵PID:432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"112⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock113⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"114⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock115⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"116⤵PID:3012
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:680
-
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock117⤵PID:2524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"118⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock119⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"120⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock.exeC:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock121⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\202405223f0c845467b75b09102609b7a2c31b50virlock"122⤵PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-