Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
-
Size
113KB
-
MD5
de27a41bd5e475550119725fa3165367
-
SHA1
4c82108c8e75182371d3629d6ff07465a02f0c29
-
SHA256
21c1ceae5da2accf9f65d55991e99fc55c435aa23cd95f5a9707e8c6579b6fd3
-
SHA512
891995e1d548c5566ad53ff447b5906c6a1569b21a18d4058628cfd346475e91f73939041f9bc6d8ed25769326dc948f72fa2f1f122e3220114ed2501df8f08c
-
SSDEEP
1536:aY1+XypbtsjvSpF2cIAzmZPZzNnLyCGlHU0TxGMAdVJG47k5OKWs7Xj/WLfM/qg:mXEbtsjvSK55nhJsLTFAdVI4Q5R2fPg
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Control Panel\International\Geo\Nation aEswowUY.exe -
Executes dropped EXE 2 IoCs
pid Process 820 gKgIcQIo.exe 3036 aEswowUY.exe -
Loads dropped DLL 20 IoCs
pid Process 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aEswowUY.exe = "C:\\ProgramData\\AKkAIEYo\\aEswowUY.exe" 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\aEswowUY.exe = "C:\\ProgramData\\AKkAIEYo\\aEswowUY.exe" aEswowUY.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\gKgIcQIo.exe = "C:\\Users\\Admin\\FqAMUYkA\\gKgIcQIo.exe" gKgIcQIo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\gKgIcQIo.exe = "C:\\Users\\Admin\\FqAMUYkA\\gKgIcQIo.exe" 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2668 reg.exe 2440 reg.exe 2560 reg.exe 1004 reg.exe 1600 reg.exe 1872 reg.exe 544 reg.exe 1648 reg.exe 2512 reg.exe 2132 reg.exe 2208 reg.exe 2392 reg.exe 2224 reg.exe 240 reg.exe 2292 reg.exe 2164 reg.exe 1908 reg.exe 1732 reg.exe 1708 reg.exe 1980 reg.exe 320 reg.exe 2992 reg.exe 2436 reg.exe 1364 reg.exe 1972 reg.exe 2192 reg.exe 2196 reg.exe 2728 reg.exe 1344 reg.exe 2684 reg.exe 1316 reg.exe 1328 reg.exe 2656 reg.exe 1156 reg.exe 2628 reg.exe 1124 reg.exe 904 reg.exe 840 reg.exe 1152 reg.exe 2920 reg.exe 1408 reg.exe 1152 reg.exe 1616 reg.exe 1732 reg.exe 2976 reg.exe 2380 reg.exe 2344 reg.exe 2252 reg.exe 2876 reg.exe 2932 reg.exe 3044 reg.exe 2916 reg.exe 1600 reg.exe 2240 reg.exe 2768 reg.exe 3056 reg.exe 1328 reg.exe 2768 reg.exe 2680 reg.exe 2168 reg.exe 292 reg.exe 1108 reg.exe 2240 reg.exe 2036 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2444 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2444 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1852 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1852 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1736 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1736 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 624 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 624 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2232 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2232 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2684 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2684 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 240 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 240 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2780 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2780 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1484 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1484 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1376 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1376 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2800 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2800 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2672 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2672 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2720 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2720 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2620 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2620 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1304 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1304 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1784 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1784 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2636 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2636 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2712 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2712 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1680 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1680 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 328 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 328 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1856 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1856 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1612 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1612 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1680 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1680 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2524 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2524 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2772 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2772 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2488 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2488 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2024 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2024 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1132 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1132 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2228 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2228 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 aEswowUY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe 3036 aEswowUY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 820 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 28 PID 2984 wrote to memory of 820 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 28 PID 2984 wrote to memory of 820 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 28 PID 2984 wrote to memory of 820 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 28 PID 2984 wrote to memory of 3036 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 29 PID 2984 wrote to memory of 3036 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 29 PID 2984 wrote to memory of 3036 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 29 PID 2984 wrote to memory of 3036 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 29 PID 2984 wrote to memory of 2576 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 30 PID 2984 wrote to memory of 2576 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 30 PID 2984 wrote to memory of 2576 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 30 PID 2984 wrote to memory of 2576 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 30 PID 2576 wrote to memory of 2508 2576 cmd.exe 32 PID 2576 wrote to memory of 2508 2576 cmd.exe 32 PID 2576 wrote to memory of 2508 2576 cmd.exe 32 PID 2576 wrote to memory of 2508 2576 cmd.exe 32 PID 2984 wrote to memory of 2672 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 33 PID 2984 wrote to memory of 2672 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 33 PID 2984 wrote to memory of 2672 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 33 PID 2984 wrote to memory of 2672 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 33 PID 2984 wrote to memory of 2976 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 34 PID 2984 wrote to memory of 2976 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 34 PID 2984 wrote to memory of 2976 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 34 PID 2984 wrote to memory of 2976 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 34 PID 2984 wrote to memory of 2660 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 36 PID 2984 wrote to memory of 2660 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 36 PID 2984 wrote to memory of 2660 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 36 PID 2984 wrote to memory of 2660 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 36 PID 2984 wrote to memory of 2516 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 38 PID 2984 wrote to memory of 2516 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 38 PID 2984 wrote to memory of 2516 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 38 PID 2984 wrote to memory of 2516 2984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 38 PID 2516 wrote to memory of 2416 2516 cmd.exe 41 PID 2516 wrote to memory of 2416 2516 cmd.exe 41 PID 2516 wrote to memory of 2416 2516 cmd.exe 41 PID 2516 wrote to memory of 2416 2516 cmd.exe 41 PID 2508 wrote to memory of 1980 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 42 PID 2508 wrote to memory of 1980 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 42 PID 2508 wrote to memory of 1980 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 42 PID 2508 wrote to memory of 1980 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 42 PID 1980 wrote to memory of 2444 1980 cmd.exe 44 PID 1980 wrote to memory of 2444 1980 cmd.exe 44 PID 1980 wrote to memory of 2444 1980 cmd.exe 44 PID 1980 wrote to memory of 2444 1980 cmd.exe 44 PID 2508 wrote to memory of 2696 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 45 PID 2508 wrote to memory of 2696 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 45 PID 2508 wrote to memory of 2696 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 45 PID 2508 wrote to memory of 2696 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 45 PID 2508 wrote to memory of 2692 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 46 PID 2508 wrote to memory of 2692 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 46 PID 2508 wrote to memory of 2692 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 46 PID 2508 wrote to memory of 2692 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 46 PID 2508 wrote to memory of 2704 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 47 PID 2508 wrote to memory of 2704 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 47 PID 2508 wrote to memory of 2704 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 47 PID 2508 wrote to memory of 2704 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 47 PID 2508 wrote to memory of 1968 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 51 PID 2508 wrote to memory of 1968 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 51 PID 2508 wrote to memory of 1968 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 51 PID 2508 wrote to memory of 1968 2508 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 51 PID 1968 wrote to memory of 2200 1968 cmd.exe 53 PID 1968 wrote to memory of 2200 1968 cmd.exe 53 PID 1968 wrote to memory of 2200 1968 cmd.exe 53 PID 1968 wrote to memory of 2200 1968 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\FqAMUYkA\gKgIcQIo.exe"C:\Users\Admin\FqAMUYkA\gKgIcQIo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:820
-
-
C:\ProgramData\AKkAIEYo\aEswowUY.exe"C:\ProgramData\AKkAIEYo\aEswowUY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3036
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"6⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"8⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"10⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"12⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"14⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"16⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"18⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"20⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"22⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"24⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"26⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"28⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"30⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"32⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"34⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"36⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"38⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"40⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"42⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"44⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"46⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"48⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"50⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"52⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"54⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"56⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"58⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"60⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"62⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"64⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock65⤵PID:1460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"66⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock67⤵PID:844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"68⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock69⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"70⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock71⤵PID:2568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"72⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock73⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"74⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock75⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"76⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock77⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"78⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock79⤵PID:1476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"80⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock81⤵PID:2532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"82⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock83⤵PID:1284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"84⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock85⤵PID:1216
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"86⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock87⤵PID:1640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"88⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock89⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"90⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock91⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"92⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock93⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"94⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock95⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"96⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock97⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"98⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock99⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"100⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock101⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"102⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock103⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"104⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock105⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"106⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock107⤵PID:1784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"108⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock109⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"110⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock111⤵PID:1844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"112⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock113⤵PID:1376
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"114⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock115⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"116⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock117⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"118⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock119⤵PID:1888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"120⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock121⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"122⤵PID:1660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-