Analysis
-
max time kernel
150s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 07:57
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe
-
Size
241KB
-
MD5
89525bfe8ee83b64d41da9141eabd1e6
-
SHA1
06500b9cb30daa2556b6ab308a39e8ad0e3cd30e
-
SHA256
81a00f50d9e2a4b198e263b0bab58dd4fe0a343d9d58c30aba3f06fa46032006
-
SHA512
9ef54cb23f1d5f68dacb2f71214f113c186cd4a63e8ca5c5054e54f90eba2b4a4af58791e04fa4ac5b30bdaddfb55f766f400f7a759e0b50d3fbd7ff340a7188
-
SSDEEP
6144:5MnUnaZAFZhBrYX9ClacHcP6bTWnbbFjSJ:CnUn6AZyt2ac7ql2J
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (87) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation yewowoos.exe -
Executes dropped EXE 2 IoCs
pid Process 3012 yewowoos.exe 3448 lqgQwoUc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lqgQwoUc.exe = "C:\\ProgramData\\WiQosIMY\\lqgQwoUc.exe" lqgQwoUc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yewowoos.exe = "C:\\Users\\Admin\\gmIMIoAc\\yewowoos.exe" 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\lqgQwoUc.exe = "C:\\ProgramData\\WiQosIMY\\lqgQwoUc.exe" 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yewowoos.exe = "C:\\Users\\Admin\\gmIMIoAc\\yewowoos.exe" yewowoos.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe yewowoos.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe yewowoos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2612 reg.exe 2644 reg.exe 4988 reg.exe 2832 reg.exe 3304 reg.exe 3900 reg.exe 4404 reg.exe 4560 reg.exe 716 reg.exe 3976 reg.exe 4560 reg.exe 872 reg.exe 4428 reg.exe 2256 reg.exe 4372 reg.exe 2200 reg.exe 5004 reg.exe 2164 reg.exe 3816 reg.exe 4680 reg.exe 4296 reg.exe 4808 reg.exe 4716 reg.exe 3484 reg.exe 2032 reg.exe 4284 reg.exe 3272 reg.exe 436 reg.exe 4336 reg.exe 5028 reg.exe 972 reg.exe 1984 reg.exe 3104 reg.exe 2052 reg.exe 2784 reg.exe 2328 reg.exe 3192 reg.exe 1616 reg.exe 5012 reg.exe 1676 reg.exe 3140 reg.exe 3900 reg.exe 2872 reg.exe 4768 reg.exe 1724 reg.exe 3904 reg.exe 4076 reg.exe 4236 reg.exe 1332 reg.exe 4760 reg.exe 3256 reg.exe 3972 reg.exe 872 reg.exe 4404 reg.exe 976 reg.exe 3004 reg.exe 4772 reg.exe 4236 reg.exe 4112 reg.exe 2476 reg.exe 3856 reg.exe 2684 reg.exe 1560 reg.exe 3740 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 112 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 112 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 112 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 112 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4220 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4220 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4220 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4220 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3064 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3064 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3064 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3064 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2540 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2540 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2540 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2540 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4128 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4128 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4128 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4128 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2620 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2620 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2620 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2620 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3100 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3100 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3100 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3100 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 844 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 844 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 844 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 844 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2880 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2880 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2880 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 2880 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3948 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3948 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3948 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 3948 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 1156 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 1156 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 1156 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 1156 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4224 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4224 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4224 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 4224 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 yewowoos.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe 3012 yewowoos.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 3012 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 86 PID 3192 wrote to memory of 3012 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 86 PID 3192 wrote to memory of 3012 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 86 PID 3192 wrote to memory of 3448 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 88 PID 3192 wrote to memory of 3448 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 88 PID 3192 wrote to memory of 3448 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 88 PID 3192 wrote to memory of 2748 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 89 PID 3192 wrote to memory of 2748 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 89 PID 3192 wrote to memory of 2748 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 89 PID 2748 wrote to memory of 3920 2748 cmd.exe 91 PID 2748 wrote to memory of 3920 2748 cmd.exe 91 PID 2748 wrote to memory of 3920 2748 cmd.exe 91 PID 3192 wrote to memory of 3356 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 92 PID 3192 wrote to memory of 3356 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 92 PID 3192 wrote to memory of 3356 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 92 PID 3192 wrote to memory of 3912 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 93 PID 3192 wrote to memory of 3912 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 93 PID 3192 wrote to memory of 3912 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 93 PID 3192 wrote to memory of 2140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 94 PID 3192 wrote to memory of 2140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 94 PID 3192 wrote to memory of 2140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 94 PID 3192 wrote to memory of 4140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 95 PID 3192 wrote to memory of 4140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 95 PID 3192 wrote to memory of 4140 3192 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 95 PID 4140 wrote to memory of 384 4140 cmd.exe 100 PID 4140 wrote to memory of 384 4140 cmd.exe 100 PID 4140 wrote to memory of 384 4140 cmd.exe 100 PID 3920 wrote to memory of 3140 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 101 PID 3920 wrote to memory of 3140 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 101 PID 3920 wrote to memory of 3140 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 101 PID 3140 wrote to memory of 4044 3140 cmd.exe 103 PID 3140 wrote to memory of 4044 3140 cmd.exe 103 PID 3140 wrote to memory of 4044 3140 cmd.exe 103 PID 3920 wrote to memory of 1564 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 104 PID 3920 wrote to memory of 1564 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 104 PID 3920 wrote to memory of 1564 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 104 PID 3920 wrote to memory of 4648 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 105 PID 3920 wrote to memory of 4648 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 105 PID 3920 wrote to memory of 4648 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 105 PID 3920 wrote to memory of 2636 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 106 PID 3920 wrote to memory of 2636 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 106 PID 3920 wrote to memory of 2636 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 106 PID 3920 wrote to memory of 4012 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 107 PID 3920 wrote to memory of 4012 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 107 PID 3920 wrote to memory of 4012 3920 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 107 PID 4012 wrote to memory of 3004 4012 cmd.exe 112 PID 4012 wrote to memory of 3004 4012 cmd.exe 112 PID 4012 wrote to memory of 3004 4012 cmd.exe 112 PID 4044 wrote to memory of 2288 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 113 PID 4044 wrote to memory of 2288 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 113 PID 4044 wrote to memory of 2288 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 113 PID 2288 wrote to memory of 112 2288 cmd.exe 115 PID 2288 wrote to memory of 112 2288 cmd.exe 115 PID 2288 wrote to memory of 112 2288 cmd.exe 115 PID 4044 wrote to memory of 3336 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 116 PID 4044 wrote to memory of 3336 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 116 PID 4044 wrote to memory of 3336 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 116 PID 4044 wrote to memory of 5060 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 117 PID 4044 wrote to memory of 5060 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 117 PID 4044 wrote to memory of 5060 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 117 PID 4044 wrote to memory of 2684 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 118 PID 4044 wrote to memory of 2684 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 118 PID 4044 wrote to memory of 2684 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 118 PID 4044 wrote to memory of 4620 4044 2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\gmIMIoAc\yewowoos.exe"C:\Users\Admin\gmIMIoAc\yewowoos.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3012
-
-
C:\ProgramData\WiQosIMY\lqgQwoUc.exe"C:\ProgramData\WiQosIMY\lqgQwoUc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3448
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"8⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"10⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"12⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"14⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"16⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"18⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"20⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"22⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"24⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"26⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"28⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"30⤵PID:4808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:3100
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"32⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock33⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"34⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock35⤵PID:2672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"36⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock37⤵PID:1904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"38⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock39⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"40⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock41⤵PID:1916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"42⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock43⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"44⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock45⤵PID:4568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"46⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock47⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"48⤵PID:4428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock49⤵PID:3660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"50⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock51⤵PID:2728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"52⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock53⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"54⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock55⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"56⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock57⤵PID:4388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"58⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock59⤵PID:3100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"60⤵PID:4224
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock61⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"62⤵PID:4244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock63⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"64⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock65⤵PID:1800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"66⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock67⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"68⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock69⤵PID:4712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"70⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock71⤵PID:4076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"72⤵PID:4568
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock73⤵PID:4136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"74⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock75⤵PID:2144
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"76⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock77⤵PID:4724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"78⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock79⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"80⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock81⤵PID:2540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"82⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock83⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"84⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock85⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"86⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock87⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"88⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock89⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"90⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock91⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"92⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock93⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"94⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock95⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"96⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock97⤵PID:452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"98⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock99⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"100⤵PID:4496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1101⤵PID:5092
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock101⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"102⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock103⤵PID:4104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"104⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock105⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"106⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock107⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"108⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock109⤵PID:1156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"110⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock111⤵PID:400
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"112⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock113⤵PID:3712
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"114⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock115⤵PID:3272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"116⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock117⤵PID:2872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"118⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock119⤵PID:2228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"120⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock121⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-23_89525bfe8ee83b64d41da9141eabd1e6_virlock"122⤵PID:1852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-