Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe
-
Size
261KB
-
MD5
730f81a158df05a5a8848d7aa177385a
-
SHA1
824506c3494072bdafc50548effd5358baab726d
-
SHA256
03f50d864618096cc19ef8df4b5a186b375c43f35af9d0d057af7e582643df33
-
SHA512
28c2f1c379681ea98469b7638baf60eca8c8f67137d0cda102ee34d0972ff981925f61dfd40b0099c9c240b9b547f01b8919fed6ebb54172a4670902730abd01
-
SSDEEP
6144:1T65NEgLW57pgao9kyEyRm7yxvQrRm49dGjmhnxID6Q:tG+gLW57pgaoWySOxkm4DKmhniDZ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (70) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation dCQsgskw.exe -
Executes dropped EXE 2 IoCs
pid Process 3224 dCQsgskw.exe 1608 LGQgwcgQ.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dCQsgskw.exe = "C:\\Users\\Admin\\fWscIIMI\\dCQsgskw.exe" 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LGQgwcgQ.exe = "C:\\ProgramData\\WMgMIQkA\\LGQgwcgQ.exe" 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dCQsgskw.exe = "C:\\Users\\Admin\\fWscIIMI\\dCQsgskw.exe" dCQsgskw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LGQgwcgQ.exe = "C:\\ProgramData\\WMgMIQkA\\LGQgwcgQ.exe" LGQgwcgQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kYAQcYow.exe = "C:\\Users\\Admin\\UyAgEcoo\\kYAQcYow.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\owEMYEoY.exe = "C:\\ProgramData\\cuMYwIcU\\owEMYEoY.exe" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe dCQsgskw.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe dCQsgskw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3796 380 Process not Found 1901 3332 4248 Process not Found 1900 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1420 reg.exe 2372 reg.exe 3924 reg.exe 3012 reg.exe 3240 reg.exe 5080 reg.exe 3792 reg.exe 856 reg.exe 1852 reg.exe 4964 reg.exe 5092 Process not Found 5048 Process not Found 3788 reg.exe 4632 reg.exe 216 reg.exe 4636 reg.exe 3048 reg.exe 384 reg.exe 3668 reg.exe 4580 reg.exe 884 reg.exe 1516 reg.exe 116 reg.exe 4052 reg.exe 4040 reg.exe 2480 reg.exe 4052 Process not Found 1852 Process not Found 4636 reg.exe 2856 reg.exe 1472 reg.exe 516 reg.exe 2432 reg.exe 1000 Process not Found 1852 Process not Found 1584 Process not Found 2240 reg.exe 3536 reg.exe 2236 reg.exe 384 reg.exe 5008 reg.exe 1972 reg.exe 1880 reg.exe 2784 reg.exe 4008 reg.exe 1940 Process not Found 3264 reg.exe 732 reg.exe 3880 reg.exe 1632 reg.exe 4004 reg.exe 1436 reg.exe 1652 reg.exe 964 Process not Found 216 Process not Found 2752 Process not Found 1572 reg.exe 4304 Process not Found 2308 Process not Found 2556 reg.exe 672 Process not Found 2108 reg.exe 2268 reg.exe 4316 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3136 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3136 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3136 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3136 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4056 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4056 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4056 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4056 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 2720 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 2720 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 2720 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 2720 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4040 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4040 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4040 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4040 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1228 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1228 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1228 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1228 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1792 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1792 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1792 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 1792 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3880 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3880 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3880 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3880 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4128 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4128 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4128 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4128 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4740 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4740 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4740 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4740 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3672 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3672 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3672 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3672 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 624 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 624 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 624 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 624 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4900 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4900 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4900 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 4900 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3012 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3012 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3012 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 3012 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3224 dCQsgskw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe 3224 dCQsgskw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 3224 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 84 PID 1856 wrote to memory of 3224 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 84 PID 1856 wrote to memory of 3224 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 84 PID 1856 wrote to memory of 1608 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 85 PID 1856 wrote to memory of 1608 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 85 PID 1856 wrote to memory of 1608 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 85 PID 1856 wrote to memory of 4248 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 86 PID 1856 wrote to memory of 4248 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 86 PID 1856 wrote to memory of 4248 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 86 PID 1856 wrote to memory of 3188 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 88 PID 1856 wrote to memory of 3188 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 88 PID 1856 wrote to memory of 3188 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 88 PID 1856 wrote to memory of 4612 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 90 PID 1856 wrote to memory of 4612 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 90 PID 1856 wrote to memory of 4612 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 90 PID 1856 wrote to memory of 864 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 91 PID 1856 wrote to memory of 864 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 91 PID 1856 wrote to memory of 864 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 91 PID 1856 wrote to memory of 3892 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 92 PID 1856 wrote to memory of 3892 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 92 PID 1856 wrote to memory of 3892 1856 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 92 PID 4248 wrote to memory of 3168 4248 cmd.exe 89 PID 4248 wrote to memory of 3168 4248 cmd.exe 89 PID 4248 wrote to memory of 3168 4248 cmd.exe 89 PID 3892 wrote to memory of 2260 3892 cmd.exe 97 PID 3892 wrote to memory of 2260 3892 cmd.exe 97 PID 3892 wrote to memory of 2260 3892 cmd.exe 97 PID 3168 wrote to memory of 2816 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 98 PID 3168 wrote to memory of 2816 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 98 PID 3168 wrote to memory of 2816 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 98 PID 2816 wrote to memory of 4332 2816 cmd.exe 100 PID 2816 wrote to memory of 4332 2816 cmd.exe 100 PID 2816 wrote to memory of 4332 2816 cmd.exe 100 PID 3168 wrote to memory of 1972 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 101 PID 3168 wrote to memory of 1972 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 101 PID 3168 wrote to memory of 1972 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 101 PID 3168 wrote to memory of 3924 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 102 PID 3168 wrote to memory of 3924 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 102 PID 3168 wrote to memory of 3924 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 102 PID 3168 wrote to memory of 2400 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 103 PID 3168 wrote to memory of 2400 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 103 PID 3168 wrote to memory of 2400 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 103 PID 3168 wrote to memory of 1224 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 104 PID 3168 wrote to memory of 1224 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 104 PID 3168 wrote to memory of 1224 3168 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 104 PID 1224 wrote to memory of 1080 1224 cmd.exe 109 PID 1224 wrote to memory of 1080 1224 cmd.exe 109 PID 1224 wrote to memory of 1080 1224 cmd.exe 109 PID 4332 wrote to memory of 64 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 110 PID 4332 wrote to memory of 64 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 110 PID 4332 wrote to memory of 64 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 110 PID 64 wrote to memory of 3136 64 cmd.exe 112 PID 64 wrote to memory of 3136 64 cmd.exe 112 PID 64 wrote to memory of 3136 64 cmd.exe 112 PID 4332 wrote to memory of 5008 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 113 PID 4332 wrote to memory of 5008 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 113 PID 4332 wrote to memory of 5008 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 113 PID 4332 wrote to memory of 4824 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 173 PID 4332 wrote to memory of 4824 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 173 PID 4332 wrote to memory of 4824 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 173 PID 4332 wrote to memory of 1996 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 172 PID 4332 wrote to memory of 1996 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 172 PID 4332 wrote to memory of 1996 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 172 PID 4332 wrote to memory of 1868 4332 2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\fWscIIMI\dCQsgskw.exe"C:\Users\Admin\fWscIIMI\dCQsgskw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3224
-
-
C:\ProgramData\WMgMIQkA\LGQgwcgQ.exe"C:\ProgramData\WMgMIQkA\LGQgwcgQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1608
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"8⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"10⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"12⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"14⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"16⤵PID:1996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"18⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"20⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"22⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"24⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"26⤵PID:4268
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"28⤵PID:4372
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"30⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"32⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock33⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"34⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock35⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"36⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock37⤵PID:3472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"38⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock39⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"40⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock41⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"42⤵PID:2300
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock43⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"44⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock45⤵PID:4020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"46⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock47⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"48⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock49⤵PID:4636
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"50⤵PID:4404
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:4268
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock51⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"52⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock53⤵PID:2900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"54⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock55⤵PID:868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"56⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock57⤵PID:968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"58⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock59⤵PID:3564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"60⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock61⤵PID:4792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"62⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock63⤵PID:4128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"64⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock65⤵PID:2132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"66⤵PID:5016
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock67⤵PID:1828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"68⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock69⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"70⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock71⤵PID:1972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"72⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock73⤵PID:4580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"74⤵PID:1348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock75⤵PID:4920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"76⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock77⤵PID:2300
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"78⤵PID:3320
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock79⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"80⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock81⤵PID:5016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"82⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock83⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"84⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock85⤵PID:3668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"86⤵PID:1932
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock87⤵PID:1104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"88⤵PID:1348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock89⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"90⤵PID:4288
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:4404
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock91⤵PID:4628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"92⤵PID:4400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock93⤵PID:3000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"94⤵PID:5040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock95⤵PID:3980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"96⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock97⤵PID:2556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"98⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock99⤵PID:4316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"100⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock101⤵PID:3312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"102⤵PID:3608
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock103⤵PID:3924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"104⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock105⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"106⤵PID:4556
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3168
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock107⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"108⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock109⤵PID:1880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"110⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock111⤵PID:3440
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"112⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock113⤵PID:1008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"114⤵PID:4180
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock115⤵PID:1544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"116⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock117⤵PID:4040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"118⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock119⤵PID:4356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"120⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock121⤵PID:1988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-28_730f81a158df05a5a8848d7aa177385a_virlock"122⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-