Analysis
-
max time kernel
17s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe
-
Size
208KB
-
MD5
8706fa98bcafd7c8dd9371cfa5e276ce
-
SHA1
0ad85ca2a9fe713a2653714455c53053979a7fdf
-
SHA256
aeafa89878bf1bf20f74243b4fc8bd37a53e03745238c0fe587fa4025e45bd5f
-
SHA512
f4f542dd77be41691d31b2b5fcdc034771146dc5d8bf5f7b92ed0ad1cb5372cd8b4947ec908ec5a192551fa1b1d19d848c261d1f96f77538c19147da96d32bae
-
SSDEEP
3072:PoWje0y9cn8qcJZceaBUn/8RdHnif0jDl0ocCLWGg/Wc5GAce+39oB:PoDP2jTdHne0vyCA95GAc539
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 59 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2512 jYgEEwcw.exe 2712 JOsYwwAY.exe -
Loads dropped DLL 20 IoCs
pid Process 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe 2712 JOsYwwAY.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\jYgEEwcw.exe = "C:\\Users\\Admin\\SyMQIsQo\\jYgEEwcw.exe" 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JOsYwwAY.exe = "C:\\ProgramData\\rswwYQsQ\\JOsYwwAY.exe" 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\jYgEEwcw.exe = "C:\\Users\\Admin\\SyMQIsQo\\jYgEEwcw.exe" jYgEEwcw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JOsYwwAY.exe = "C:\\ProgramData\\rswwYQsQ\\JOsYwwAY.exe" JOsYwwAY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1296 reg.exe 1680 reg.exe 2500 reg.exe 2864 reg.exe 1876 reg.exe 3016 reg.exe 1400 reg.exe 2588 reg.exe 2788 reg.exe 1312 reg.exe 2676 reg.exe 1976 reg.exe 2448 reg.exe 2700 reg.exe 2920 reg.exe 1772 reg.exe 1100 reg.exe 2404 reg.exe 960 reg.exe 2836 reg.exe 2948 reg.exe 2436 reg.exe 1580 reg.exe 1304 reg.exe 1500 reg.exe 2788 reg.exe 1480 reg.exe 960 reg.exe 672 reg.exe 1836 reg.exe 2364 reg.exe 2680 reg.exe 2292 reg.exe 2672 reg.exe 1580 reg.exe 1352 reg.exe 1552 reg.exe 772 reg.exe 1952 reg.exe 1668 reg.exe 2652 reg.exe 2292 reg.exe 696 reg.exe 1824 reg.exe 1964 reg.exe 1568 reg.exe 2104 reg.exe 2408 reg.exe 2488 reg.exe 1992 reg.exe 240 reg.exe 2684 reg.exe 1796 reg.exe 1780 reg.exe 1980 reg.exe 2724 reg.exe 1276 reg.exe 1792 reg.exe 2320 reg.exe 960 reg.exe 2704 reg.exe 2924 reg.exe 800 reg.exe 3036 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 564 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 564 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2680 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2680 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2880 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2880 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1340 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1340 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1964 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1964 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2804 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2804 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1708 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1708 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1040 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1040 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1140 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1140 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1300 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1300 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2560 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2560 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1740 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1740 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2496 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2496 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 564 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 564 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1052 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1052 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 952 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 952 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2572 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2572 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1284 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1284 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2144 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2144 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2876 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2876 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2356 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2356 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2584 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2584 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1728 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1728 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2760 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2760 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1608 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1608 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 892 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 892 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1012 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 1012 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2528 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 2528 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2512 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 28 PID 3048 wrote to memory of 2512 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 28 PID 3048 wrote to memory of 2512 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 28 PID 3048 wrote to memory of 2512 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 28 PID 3048 wrote to memory of 2712 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 29 PID 3048 wrote to memory of 2712 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 29 PID 3048 wrote to memory of 2712 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 29 PID 3048 wrote to memory of 2712 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 29 PID 3048 wrote to memory of 2768 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 30 PID 3048 wrote to memory of 2768 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 30 PID 3048 wrote to memory of 2768 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 30 PID 3048 wrote to memory of 2768 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 30 PID 2768 wrote to memory of 2104 2768 cmd.exe 248 PID 2768 wrote to memory of 2104 2768 cmd.exe 248 PID 2768 wrote to memory of 2104 2768 cmd.exe 248 PID 2768 wrote to memory of 2104 2768 cmd.exe 248 PID 3048 wrote to memory of 2720 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 32 PID 3048 wrote to memory of 2720 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 32 PID 3048 wrote to memory of 2720 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 32 PID 3048 wrote to memory of 2720 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 32 PID 3048 wrote to memory of 2620 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 34 PID 3048 wrote to memory of 2620 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 34 PID 3048 wrote to memory of 2620 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 34 PID 3048 wrote to memory of 2620 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 34 PID 3048 wrote to memory of 2448 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 35 PID 3048 wrote to memory of 2448 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 35 PID 3048 wrote to memory of 2448 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 35 PID 3048 wrote to memory of 2448 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 35 PID 3048 wrote to memory of 2440 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 38 PID 3048 wrote to memory of 2440 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 38 PID 3048 wrote to memory of 2440 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 38 PID 3048 wrote to memory of 2440 3048 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 38 PID 2440 wrote to memory of 672 2440 cmd.exe 492 PID 2440 wrote to memory of 672 2440 cmd.exe 492 PID 2440 wrote to memory of 672 2440 cmd.exe 492 PID 2440 wrote to memory of 672 2440 cmd.exe 492 PID 2104 wrote to memory of 1076 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 42 PID 2104 wrote to memory of 1076 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 42 PID 2104 wrote to memory of 1076 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 42 PID 2104 wrote to memory of 1076 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 42 PID 1076 wrote to memory of 564 1076 cmd.exe 200 PID 1076 wrote to memory of 564 1076 cmd.exe 200 PID 1076 wrote to memory of 564 1076 cmd.exe 200 PID 1076 wrote to memory of 564 1076 cmd.exe 200 PID 2104 wrote to memory of 1640 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 45 PID 2104 wrote to memory of 1640 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 45 PID 2104 wrote to memory of 1640 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 45 PID 2104 wrote to memory of 1640 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 45 PID 2104 wrote to memory of 1772 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 504 PID 2104 wrote to memory of 1772 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 504 PID 2104 wrote to memory of 1772 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 504 PID 2104 wrote to memory of 1772 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 504 PID 2104 wrote to memory of 2732 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 47 PID 2104 wrote to memory of 2732 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 47 PID 2104 wrote to memory of 2732 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 47 PID 2104 wrote to memory of 2732 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 47 PID 2104 wrote to memory of 2956 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 50 PID 2104 wrote to memory of 2956 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 50 PID 2104 wrote to memory of 2956 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 50 PID 2104 wrote to memory of 2956 2104 2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe 50 PID 2956 wrote to memory of 2112 2956 cmd.exe 196 PID 2956 wrote to memory of 2112 2956 cmd.exe 196 PID 2956 wrote to memory of 2112 2956 cmd.exe 196 PID 2956 wrote to memory of 2112 2956 cmd.exe 196
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\SyMQIsQo\jYgEEwcw.exe"C:\Users\Admin\SyMQIsQo\jYgEEwcw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2512
-
-
C:\ProgramData\rswwYQsQ\JOsYwwAY.exe"C:\ProgramData\rswwYQsQ\JOsYwwAY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2712
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"6⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"8⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"10⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"12⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"14⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"16⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"18⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"20⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"22⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"24⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"26⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"28⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"30⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"32⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"34⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"36⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"38⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"40⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"42⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"44⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"46⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"48⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"50⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"52⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"54⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"56⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"58⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"60⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"62⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"64⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock65⤵PID:1936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"66⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock67⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"68⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock69⤵PID:1756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"70⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock71⤵PID:2208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"72⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock73⤵PID:964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"74⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock75⤵PID:2456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"76⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock77⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"78⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock79⤵PID:1740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"80⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock81⤵PID:3064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"82⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock83⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"84⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock85⤵PID:1444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"86⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock87⤵PID:892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"88⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock89⤵PID:2356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"90⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock91⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"92⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock93⤵PID:1272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"94⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock95⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"96⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock97⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"98⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock99⤵PID:1872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"100⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock101⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"102⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock103⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"104⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock105⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"106⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock107⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"108⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock109⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"110⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock111⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"112⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock113⤵PID:1052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"114⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock115⤵PID:1400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"116⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock117⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"118⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock119⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"120⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock121⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-09_8706fa98bcafd7c8dd9371cfa5e276ce_virlock"122⤵PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-