Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 11:39
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe
-
Size
202KB
-
MD5
6db37117e8c0e5aeba603cbb6b97b82c
-
SHA1
f81aa8cec4472771da6a97eab56f9bced6fb4ec3
-
SHA256
baf8a44716c5f3cdceba80c4829c1dfe1cf85f70738ed7751300c94399a466f1
-
SHA512
c6886cd3de301f9bcc540a9ff9acbb95a196a8c9ec69023e1281d7033f1fd12a6623a665b5878f246cf56e04e8e3275b72cf03f814d2a22ee78a1518f0c020ff
-
SSDEEP
3072:290rs48O0lrcIX5i7RlDRvo2GBmQIg51uHR69+tcliXrOyswHu5TTxU28r4/:26ErLpiHZo2+mng51uHGOWiXrU6B4/
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tgoUEksY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation tgoUEksY.exe -
Executes dropped EXE 2 IoCs
Processes:
tgoUEksY.exetsQIwAME.exepid process 2976 tgoUEksY.exe 1620 tsQIwAME.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exetgoUEksY.exepid process 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exetgoUEksY.exetsQIwAME.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\tgoUEksY.exe = "C:\\Users\\Admin\\WqsQIUws\\tgoUEksY.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tsQIwAME.exe = "C:\\ProgramData\\mmkQsgYI\\tsQIwAME.exe" 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\tgoUEksY.exe = "C:\\Users\\Admin\\WqsQIUws\\tgoUEksY.exe" tgoUEksY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tsQIwAME.exe = "C:\\ProgramData\\mmkQsgYI\\tsQIwAME.exe" tsQIwAME.exe -
Drops file in Windows directory 1 IoCs
Processes:
tgoUEksY.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico tgoUEksY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2960 reg.exe 2960 reg.exe 1880 reg.exe 2740 reg.exe 1896 reg.exe 2776 reg.exe 1280 reg.exe 1960 reg.exe 1232 reg.exe 672 reg.exe 2120 reg.exe 992 reg.exe 2404 reg.exe 2248 reg.exe 2356 reg.exe 268 reg.exe 1576 reg.exe 1600 reg.exe 2096 reg.exe 2144 reg.exe 448 reg.exe 2500 reg.exe 468 reg.exe 2572 reg.exe 2164 reg.exe 1404 reg.exe 2280 reg.exe 692 reg.exe 2524 reg.exe 2368 reg.exe 692 reg.exe 2440 reg.exe 1520 reg.exe 2452 reg.exe 2328 reg.exe 660 reg.exe 2544 reg.exe 3056 reg.exe 2184 reg.exe 2244 reg.exe 1932 reg.exe 584 reg.exe 2720 reg.exe 2584 reg.exe 2112 reg.exe 2044 reg.exe 2212 reg.exe 748 reg.exe 1888 reg.exe 1476 reg.exe 1452 reg.exe 344 reg.exe 2748 reg.exe 1824 reg.exe 976 reg.exe 2124 reg.exe 672 reg.exe 2864 reg.exe 2672 reg.exe 1016 reg.exe 1996 reg.exe 2804 reg.exe 1920 reg.exe 2480 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exepid process 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1504 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1504 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2280 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2280 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 672 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 672 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3052 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3052 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1428 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1428 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2432 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2432 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1856 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1856 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1676 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1676 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2264 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2264 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3024 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3024 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3064 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3064 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 884 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 884 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2612 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1436 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1436 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2684 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2684 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 836 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 836 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3028 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 3028 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 548 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 548 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2288 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2288 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1548 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1548 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1040 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1040 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2264 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2264 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2096 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2096 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2536 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2536 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2404 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2404 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 760 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 760 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 896 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 896 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1652 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 1652 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2836 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 2836 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 864 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe 864 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
tgoUEksY.exepid process 2976 tgoUEksY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
tgoUEksY.exepid process 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe 2976 tgoUEksY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.execmd.execmd.exe2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.execmd.execmd.exedescription pid process target process PID 1888 wrote to memory of 2976 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tgoUEksY.exe PID 1888 wrote to memory of 2976 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tgoUEksY.exe PID 1888 wrote to memory of 2976 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tgoUEksY.exe PID 1888 wrote to memory of 2976 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tgoUEksY.exe PID 1888 wrote to memory of 1620 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tsQIwAME.exe PID 1888 wrote to memory of 1620 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tsQIwAME.exe PID 1888 wrote to memory of 1620 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tsQIwAME.exe PID 1888 wrote to memory of 1620 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe tsQIwAME.exe PID 1888 wrote to memory of 2680 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2680 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2680 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2680 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2680 wrote to memory of 2800 2680 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 2680 wrote to memory of 2800 2680 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 2680 wrote to memory of 2800 2680 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 2680 wrote to memory of 2800 2680 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1888 wrote to memory of 2500 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2500 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2500 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2500 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 1108 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 1108 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 1108 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 1108 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2556 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2556 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2556 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2556 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 1888 wrote to memory of 2532 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2532 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2532 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1888 wrote to memory of 2532 1888 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2532 wrote to memory of 1876 2532 cmd.exe cscript.exe PID 2532 wrote to memory of 1876 2532 cmd.exe cscript.exe PID 2532 wrote to memory of 1876 2532 cmd.exe cscript.exe PID 2532 wrote to memory of 1876 2532 cmd.exe cscript.exe PID 2800 wrote to memory of 1548 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 1548 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 1548 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 1548 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 1548 wrote to memory of 1504 1548 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1548 wrote to memory of 1504 1548 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1548 wrote to memory of 1504 1548 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 1548 wrote to memory of 1504 1548 cmd.exe 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe PID 2800 wrote to memory of 1352 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1352 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1352 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1352 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1468 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1468 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1468 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 1468 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 2384 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 2384 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 2384 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 2384 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe reg.exe PID 2800 wrote to memory of 2356 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 2356 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 2356 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2800 wrote to memory of 2356 2800 2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe cmd.exe PID 2356 wrote to memory of 1840 2356 cmd.exe cscript.exe PID 2356 wrote to memory of 1840 2356 cmd.exe cscript.exe PID 2356 wrote to memory of 1840 2356 cmd.exe cscript.exe PID 2356 wrote to memory of 1840 2356 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\WqsQIUws\tgoUEksY.exe"C:\Users\Admin\WqsQIUws\tgoUEksY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2976
-
-
C:\ProgramData\mmkQsgYI\tsQIwAME.exe"C:\ProgramData\mmkQsgYI\tsQIwAME.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1620
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"6⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"8⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"10⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"12⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"14⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"16⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"18⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"20⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"22⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"24⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"26⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"28⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"30⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"32⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"34⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"36⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"38⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"40⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"42⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"44⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"46⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"48⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2096 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"50⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"52⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"54⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"56⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"58⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"60⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"62⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"64⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock65⤵PID:1644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"66⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock67⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"68⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock69⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"70⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock71⤵PID:304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"72⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock73⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"74⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock75⤵PID:1052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"76⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock77⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"78⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock79⤵PID:1668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"80⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock81⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"82⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock83⤵PID:2112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"84⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock85⤵PID:448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"86⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock87⤵PID:1108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"88⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock89⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"90⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock91⤵PID:2624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"92⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock93⤵PID:2384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"94⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock95⤵PID:344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"96⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock97⤵PID:1832
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"98⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock99⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"100⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock101⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"102⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock103⤵PID:2716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"104⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock105⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"106⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock107⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"108⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock109⤵PID:1460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"110⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock111⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"112⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock113⤵PID:2788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"114⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock115⤵PID:2892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"116⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock117⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"118⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock119⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"120⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock121⤵PID:2496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6db37117e8c0e5aeba603cbb6b97b82c_virlock"122⤵PID:2532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-