Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 05:42
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe
-
Size
113KB
-
MD5
de27a41bd5e475550119725fa3165367
-
SHA1
4c82108c8e75182371d3629d6ff07465a02f0c29
-
SHA256
21c1ceae5da2accf9f65d55991e99fc55c435aa23cd95f5a9707e8c6579b6fd3
-
SHA512
891995e1d548c5566ad53ff447b5906c6a1569b21a18d4058628cfd346475e91f73939041f9bc6d8ed25769326dc948f72fa2f1f122e3220114ed2501df8f08c
-
SSDEEP
1536:aY1+XypbtsjvSpF2cIAzmZPZzNnLyCGlHU0TxGMAdVJG47k5OKWs7Xj/WLfM/qg:mXEbtsjvSK55nhJsLTFAdVI4Q5R2fPg
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (82) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation yQUUMkQg.exe -
Executes dropped EXE 2 IoCs
pid Process 1632 yQUUMkQg.exe 1548 sSgkMUwQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sSgkMUwQ.exe = "C:\\ProgramData\\kmMcoosE\\sSgkMUwQ.exe" 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yQUUMkQg.exe = "C:\\Users\\Admin\\wiooYUsk\\yQUUMkQg.exe" yQUUMkQg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sSgkMUwQ.exe = "C:\\ProgramData\\kmMcoosE\\sSgkMUwQ.exe" sSgkMUwQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yQUUMkQg.exe = "C:\\Users\\Admin\\wiooYUsk\\yQUUMkQg.exe" 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe yQUUMkQg.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe yQUUMkQg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4568 reg.exe 4656 reg.exe 4912 reg.exe 1788 reg.exe 4108 reg.exe 3716 reg.exe 4488 reg.exe 4444 reg.exe 4016 reg.exe 4104 reg.exe 2740 reg.exe 4672 reg.exe 1052 reg.exe 1276 reg.exe 2324 reg.exe 3540 reg.exe 3256 reg.exe 4124 reg.exe 3284 reg.exe 4856 reg.exe 1188 reg.exe 5076 reg.exe 4876 reg.exe 4228 reg.exe 4416 reg.exe 2996 reg.exe 4500 reg.exe 2124 reg.exe 1844 reg.exe 1468 reg.exe 4500 reg.exe 3460 reg.exe 3992 reg.exe 2136 reg.exe 4744 reg.exe 1484 reg.exe 4832 reg.exe 2200 reg.exe 616 reg.exe 1788 reg.exe 1744 reg.exe 4520 reg.exe 4908 reg.exe 3548 reg.exe 5056 reg.exe 4732 reg.exe 3548 reg.exe 1980 reg.exe 2740 reg.exe 1420 reg.exe 3732 reg.exe 5108 reg.exe 336 reg.exe 1392 reg.exe 3788 reg.exe 5080 reg.exe 2620 reg.exe 776 reg.exe 4392 reg.exe 2040 reg.exe 4496 reg.exe 4160 reg.exe 4116 reg.exe 2740 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3356 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3356 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3356 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3356 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3108 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3108 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3108 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3108 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2504 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2504 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2504 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 2504 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4016 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3832 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3832 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3832 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3832 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3100 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3100 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3100 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 3100 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 844 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 844 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 844 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 844 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4652 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4652 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4652 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4652 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4924 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4924 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4924 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4924 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1120 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1268 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1268 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1268 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 1268 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 4984 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1632 yQUUMkQg.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe 1632 yQUUMkQg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2708 wrote to memory of 1632 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 83 PID 2708 wrote to memory of 1632 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 83 PID 2708 wrote to memory of 1632 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 83 PID 2708 wrote to memory of 1548 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 84 PID 2708 wrote to memory of 1548 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 84 PID 2708 wrote to memory of 1548 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 84 PID 2708 wrote to memory of 3440 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 85 PID 2708 wrote to memory of 3440 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 85 PID 2708 wrote to memory of 3440 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 85 PID 3440 wrote to memory of 4452 3440 cmd.exe 87 PID 3440 wrote to memory of 4452 3440 cmd.exe 87 PID 3440 wrote to memory of 4452 3440 cmd.exe 87 PID 2708 wrote to memory of 1888 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 88 PID 2708 wrote to memory of 1888 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 88 PID 2708 wrote to memory of 1888 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 88 PID 2708 wrote to memory of 2136 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 89 PID 2708 wrote to memory of 2136 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 89 PID 2708 wrote to memory of 2136 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 89 PID 2708 wrote to memory of 3708 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 90 PID 2708 wrote to memory of 3708 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 90 PID 2708 wrote to memory of 3708 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 90 PID 2708 wrote to memory of 404 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 91 PID 2708 wrote to memory of 404 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 91 PID 2708 wrote to memory of 404 2708 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 91 PID 404 wrote to memory of 3232 404 cmd.exe 97 PID 404 wrote to memory of 3232 404 cmd.exe 97 PID 404 wrote to memory of 3232 404 cmd.exe 97 PID 4452 wrote to memory of 1980 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 96 PID 4452 wrote to memory of 1980 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 96 PID 4452 wrote to memory of 1980 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 96 PID 1980 wrote to memory of 4560 1980 cmd.exe 99 PID 1980 wrote to memory of 4560 1980 cmd.exe 99 PID 1980 wrote to memory of 4560 1980 cmd.exe 99 PID 4452 wrote to memory of 4584 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 100 PID 4452 wrote to memory of 4584 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 100 PID 4452 wrote to memory of 4584 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 100 PID 4452 wrote to memory of 2524 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 101 PID 4452 wrote to memory of 2524 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 101 PID 4452 wrote to memory of 2524 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 101 PID 4452 wrote to memory of 1428 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 102 PID 4452 wrote to memory of 1428 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 102 PID 4452 wrote to memory of 1428 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 102 PID 4452 wrote to memory of 2528 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 103 PID 4452 wrote to memory of 2528 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 103 PID 4452 wrote to memory of 2528 4452 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 103 PID 2528 wrote to memory of 4488 2528 cmd.exe 108 PID 2528 wrote to memory of 4488 2528 cmd.exe 108 PID 2528 wrote to memory of 4488 2528 cmd.exe 108 PID 4560 wrote to memory of 3328 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 109 PID 4560 wrote to memory of 3328 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 109 PID 4560 wrote to memory of 3328 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 109 PID 3328 wrote to memory of 3356 3328 cmd.exe 111 PID 3328 wrote to memory of 3356 3328 cmd.exe 111 PID 3328 wrote to memory of 3356 3328 cmd.exe 111 PID 4560 wrote to memory of 4924 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 112 PID 4560 wrote to memory of 4924 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 112 PID 4560 wrote to memory of 4924 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 112 PID 4560 wrote to memory of 2204 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 113 PID 4560 wrote to memory of 2204 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 113 PID 4560 wrote to memory of 2204 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 113 PID 4560 wrote to memory of 3488 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 114 PID 4560 wrote to memory of 3488 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 114 PID 4560 wrote to memory of 3488 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 114 PID 4560 wrote to memory of 4320 4560 2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\wiooYUsk\yQUUMkQg.exe"C:\Users\Admin\wiooYUsk\yQUUMkQg.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1632
-
-
C:\ProgramData\kmMcoosE\sSgkMUwQ.exe"C:\ProgramData\kmMcoosE\sSgkMUwQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"8⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"10⤵PID:4704
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"12⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"14⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"16⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"18⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"20⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"22⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"24⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"26⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"28⤵PID:4720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"30⤵PID:2524
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV131⤵PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"32⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock33⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"34⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock35⤵PID:4832
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"36⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock37⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"38⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock39⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"40⤵PID:4228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:4924
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock41⤵PID:2012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"42⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock43⤵PID:4124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"44⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock45⤵PID:3384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"46⤵PID:3496
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock47⤵PID:4108
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"48⤵PID:2372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:1000
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock49⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"50⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock51⤵PID:3748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"52⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock53⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"54⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock55⤵PID:3548
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"56⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock57⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"58⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock59⤵PID:1644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"60⤵PID:2424
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock61⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"62⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock63⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"64⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock65⤵PID:4460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"66⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock67⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"68⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock69⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"70⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock71⤵PID:1932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"72⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock73⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"74⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock75⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"76⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock77⤵PID:2564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"78⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock79⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"80⤵PID:2472
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock81⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"82⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock83⤵PID:4836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"84⤵PID:2744
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock85⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"86⤵PID:908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock87⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"88⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock89⤵PID:4700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"90⤵PID:1388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock91⤵PID:3256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"92⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock93⤵PID:680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"94⤵PID:844
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock95⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"96⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock97⤵PID:2128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"98⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock99⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"100⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock101⤵PID:5040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"102⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock103⤵PID:2060
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"104⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock105⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"106⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock107⤵PID:1132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"108⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock109⤵PID:1272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"110⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock111⤵PID:4392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"112⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock113⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"114⤵PID:3548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock115⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"116⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock117⤵PID:884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"118⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock119⤵PID:3140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"120⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock121⤵PID:2316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-24_de27a41bd5e475550119725fa3165367_virlock"122⤵PID:4184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-