Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe
-
Size
189KB
-
MD5
6d874e41449792478345cbc917bfbb5d
-
SHA1
3a8888f4cb9cf6490afc04e80177dd37b445ada2
-
SHA256
a751a60b06499e204d9abfaf588df1954c2d0b33226bc426473907256147a389
-
SHA512
ba3242860f70f46a39351ca4c51534cfafc6d3126817ada92a7200d1b8a5938d8a5c2760ada050d455ed08f03aa8c309e4696e3d3f1a1ea15856fd78ec7e4c0d
-
SSDEEP
3072:2ieAr74wFkOLyIwxUwwwW2NMwowwS46mMFRwqgLYbXzooHj1WcL6+20+7XHpksii:3KaM46mMFRwqgLYbXzooHj1Wy6xDXJkq
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (61) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
zGMUckMY.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Control Panel\International\Geo\Nation zGMUckMY.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2652 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
bQQYAsYQ.exezGMUckMY.exepid process 2976 bQQYAsYQ.exe 2624 zGMUckMY.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exezGMUckMY.exepid process 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exezGMUckMY.exebQQYAsYQ.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\bQQYAsYQ.exe = "C:\\Users\\Admin\\DuIQgwQc\\bQQYAsYQ.exe" 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zGMUckMY.exe = "C:\\ProgramData\\zaAIkMEQ\\zGMUckMY.exe" 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\zGMUckMY.exe = "C:\\ProgramData\\zaAIkMEQ\\zGMUckMY.exe" zGMUckMY.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\bQQYAsYQ.exe = "C:\\Users\\Admin\\DuIQgwQc\\bQQYAsYQ.exe" bQQYAsYQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1108 reg.exe 2396 reg.exe 2280 reg.exe 928 reg.exe 1424 reg.exe 2500 reg.exe 1624 reg.exe 2212 reg.exe 1720 reg.exe 2860 reg.exe 1428 reg.exe 1848 reg.exe 2396 reg.exe 2148 reg.exe 2316 reg.exe 2924 reg.exe 1836 reg.exe 2532 reg.exe 1980 reg.exe 2464 reg.exe 1768 reg.exe 2180 reg.exe 840 reg.exe 1532 reg.exe 1692 reg.exe 2404 reg.exe 2212 reg.exe 1528 reg.exe 340 reg.exe 1836 reg.exe 2784 reg.exe 2640 reg.exe 2600 reg.exe 2000 reg.exe 2180 reg.exe 620 reg.exe 2592 reg.exe 1936 reg.exe 1312 reg.exe 2852 reg.exe 1228 reg.exe 1548 reg.exe 2816 reg.exe 680 reg.exe 1972 reg.exe 2408 reg.exe 896 reg.exe 2836 reg.exe 908 reg.exe 836 reg.exe 1928 reg.exe 1520 reg.exe 2852 reg.exe 2744 reg.exe 2216 reg.exe 2216 reg.exe 1500 reg.exe 2548 reg.exe 1748 reg.exe 2460 reg.exe 2272 reg.exe 1228 reg.exe 300 reg.exe 2448 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exepid process 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2716 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2716 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2820 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2820 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 772 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 772 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 300 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 300 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2856 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2856 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2528 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2528 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2716 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2716 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2384 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2384 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 772 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 772 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3040 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 3040 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2272 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2272 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 348 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 348 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2108 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2108 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1844 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1844 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1796 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1796 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1536 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1536 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1268 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1268 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 276 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 276 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1448 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1448 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1924 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1924 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1432 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1432 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2576 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2576 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1256 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1256 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2404 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2404 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1696 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1696 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2784 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2784 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2956 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2956 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1216 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 1216 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2708 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe 2708 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
zGMUckMY.exepid process 2624 zGMUckMY.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
zGMUckMY.exepid process 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe 2624 zGMUckMY.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.execmd.execmd.exe2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.execmd.execmd.exedescription pid process target process PID 2084 wrote to memory of 2976 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe bQQYAsYQ.exe PID 2084 wrote to memory of 2976 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe bQQYAsYQ.exe PID 2084 wrote to memory of 2976 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe bQQYAsYQ.exe PID 2084 wrote to memory of 2976 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe bQQYAsYQ.exe PID 2084 wrote to memory of 2624 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe zGMUckMY.exe PID 2084 wrote to memory of 2624 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe zGMUckMY.exe PID 2084 wrote to memory of 2624 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe zGMUckMY.exe PID 2084 wrote to memory of 2624 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe zGMUckMY.exe PID 2084 wrote to memory of 2756 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2756 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2756 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2756 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2756 wrote to memory of 3056 2756 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2756 wrote to memory of 3056 2756 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2756 wrote to memory of 3056 2756 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2756 wrote to memory of 3056 2756 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2084 wrote to memory of 1108 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 1108 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 1108 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 1108 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2600 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2600 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2600 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2600 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2336 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2336 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2336 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2336 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 2084 wrote to memory of 2744 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2744 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2744 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2084 wrote to memory of 2744 2084 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2744 wrote to memory of 2604 2744 cmd.exe cscript.exe PID 2744 wrote to memory of 2604 2744 cmd.exe cscript.exe PID 2744 wrote to memory of 2604 2744 cmd.exe cscript.exe PID 2744 wrote to memory of 2604 2744 cmd.exe cscript.exe PID 3056 wrote to memory of 2540 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 2540 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 2540 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 2540 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 2540 wrote to memory of 2716 2540 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2540 wrote to memory of 2716 2540 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2540 wrote to memory of 2716 2540 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 2540 wrote to memory of 2716 2540 cmd.exe 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe PID 3056 wrote to memory of 1584 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1584 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1584 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1584 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1684 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1684 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1684 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1684 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1936 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1936 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1936 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 1936 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe reg.exe PID 3056 wrote to memory of 820 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 820 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 820 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 3056 wrote to memory of 820 3056 2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe cmd.exe PID 820 wrote to memory of 900 820 cmd.exe cscript.exe PID 820 wrote to memory of 900 820 cmd.exe cscript.exe PID 820 wrote to memory of 900 820 cmd.exe cscript.exe PID 820 wrote to memory of 900 820 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\DuIQgwQc\bQQYAsYQ.exe"C:\Users\Admin\DuIQgwQc\bQQYAsYQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2976
-
-
C:\ProgramData\zaAIkMEQ\zGMUckMY.exe"C:\ProgramData\zaAIkMEQ\zGMUckMY.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2624
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"6⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"8⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"10⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"12⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"14⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"16⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"18⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"20⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"22⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"24⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"26⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"28⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"30⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"32⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"34⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"36⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"38⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"40⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"42⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"44⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"46⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"48⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"50⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"52⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"54⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"56⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"58⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"60⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"62⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"64⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock65⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"66⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock67⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"68⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock69⤵PID:1428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"70⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock71⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"72⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock73⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"74⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock75⤵PID:1660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"76⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock77⤵PID:2456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"78⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock79⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"80⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock81⤵PID:2728
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"82⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock83⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"84⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock85⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"86⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock87⤵PID:1908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"88⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock89⤵PID:668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"90⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock91⤵PID:2540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"92⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock93⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"94⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock95⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"96⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock97⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"98⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock99⤵PID:1228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"100⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock101⤵PID:380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"102⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock103⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"104⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock105⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"106⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock107⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"108⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock109⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"110⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock111⤵PID:704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"112⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock113⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"114⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock115⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"116⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock117⤵PID:2948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"118⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock119⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"120⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock121⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-25_6d874e41449792478345cbc917bfbb5d_virlock"122⤵PID:2316
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-