Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11/06/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe
-
Size
123KB
-
MD5
139918518fe0162c1ee92388bb5a7ce0
-
SHA1
3aa3e8f262ba0b1f77463bb828110909b705f5be
-
SHA256
63b309b5e85517ea2db32813bc5d5e504a9548f3d29b5dd88aaa4c5e97e766d6
-
SHA512
20e506cd05a7339e73ef2f6233943143a00294e5079983ba07d00ad6608b73fa2e0d1b611e511b92921792e85732934f654bd3515707d76c28185fd191398cf3
-
SSDEEP
3072:KprT5ike9IExce31FR6dy6wDY27MwlWqlWqlWqlWqlWqlWqlWqlWqlWqlW9:KpQ9Ile31Fwjw02YwPPPPPPPPPS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation GCwksMAI.exe -
Executes dropped EXE 2 IoCs
pid Process 2056 GCwksMAI.exe 856 ogUsQUkA.exe -
Loads dropped DLL 20 IoCs
pid Process 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\GCwksMAI.exe = "C:\\Users\\Admin\\MEscAkMo\\GCwksMAI.exe" GCwksMAI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ogUsQUkA.exe = "C:\\ProgramData\\MqEMwoUY\\ogUsQUkA.exe" ogUsQUkA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\GCwksMAI.exe = "C:\\Users\\Admin\\MEscAkMo\\GCwksMAI.exe" 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ogUsQUkA.exe = "C:\\ProgramData\\MqEMwoUY\\ogUsQUkA.exe" 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico GCwksMAI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1452 reg.exe 2852 reg.exe 2236 reg.exe 1584 reg.exe 308 reg.exe 2840 reg.exe 2800 reg.exe 360 reg.exe 2336 reg.exe 1876 reg.exe 2596 reg.exe 1732 reg.exe 832 reg.exe 604 reg.exe 2500 reg.exe 2328 reg.exe 1868 reg.exe 1976 reg.exe 2596 reg.exe 2532 reg.exe 1996 reg.exe 1784 reg.exe 2812 reg.exe 2180 reg.exe 1616 reg.exe 2200 reg.exe 1852 reg.exe 2720 reg.exe 1556 reg.exe 1500 reg.exe 2300 reg.exe 3056 reg.exe 2112 reg.exe 1760 reg.exe 588 reg.exe 1912 reg.exe 1640 reg.exe 1336 reg.exe 596 reg.exe 1888 reg.exe 1468 reg.exe 1336 reg.exe 2268 reg.exe 2648 reg.exe 1832 reg.exe 2652 reg.exe 2012 reg.exe 2384 reg.exe 2012 reg.exe 288 reg.exe 1720 reg.exe 588 reg.exe 2488 reg.exe 1416 reg.exe 1916 reg.exe 1032 reg.exe 2468 reg.exe 2296 reg.exe 2264 reg.exe 1664 reg.exe 2568 reg.exe 2800 reg.exe 2128 reg.exe 1612 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2460 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2460 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2320 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2320 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 684 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 684 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1060 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1060 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 868 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 868 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2668 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2668 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2516 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2516 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2796 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2796 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2040 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2040 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1888 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1888 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 920 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 920 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2448 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2448 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1676 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1676 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2036 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2036 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1432 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1432 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1084 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1084 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1888 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1888 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2152 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2152 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2020 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2020 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2104 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 2104 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1328 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1328 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 776 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 776 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1864 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1864 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1664 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1664 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1016 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1016 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 716 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 716 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1868 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1868 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1528 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1528 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 820 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 820 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1568 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 1568 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2056 GCwksMAI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe 2056 GCwksMAI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2056 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 28 PID 2276 wrote to memory of 2056 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 28 PID 2276 wrote to memory of 2056 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 28 PID 2276 wrote to memory of 2056 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 28 PID 2276 wrote to memory of 856 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 29 PID 2276 wrote to memory of 856 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 29 PID 2276 wrote to memory of 856 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 29 PID 2276 wrote to memory of 856 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 29 PID 2276 wrote to memory of 2516 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 30 PID 2276 wrote to memory of 2516 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 30 PID 2276 wrote to memory of 2516 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 30 PID 2276 wrote to memory of 2516 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 30 PID 2516 wrote to memory of 2592 2516 cmd.exe 32 PID 2516 wrote to memory of 2592 2516 cmd.exe 32 PID 2516 wrote to memory of 2592 2516 cmd.exe 32 PID 2516 wrote to memory of 2592 2516 cmd.exe 32 PID 2276 wrote to memory of 2632 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 33 PID 2276 wrote to memory of 2632 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 33 PID 2276 wrote to memory of 2632 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 33 PID 2276 wrote to memory of 2632 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 33 PID 2276 wrote to memory of 2644 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 34 PID 2276 wrote to memory of 2644 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 34 PID 2276 wrote to memory of 2644 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 34 PID 2276 wrote to memory of 2644 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 34 PID 2276 wrote to memory of 2560 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 36 PID 2276 wrote to memory of 2560 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 36 PID 2276 wrote to memory of 2560 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 36 PID 2276 wrote to memory of 2560 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 36 PID 2276 wrote to memory of 2620 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 39 PID 2276 wrote to memory of 2620 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 39 PID 2276 wrote to memory of 2620 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 39 PID 2276 wrote to memory of 2620 2276 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 39 PID 2620 wrote to memory of 2544 2620 cmd.exe 41 PID 2620 wrote to memory of 2544 2620 cmd.exe 41 PID 2620 wrote to memory of 2544 2620 cmd.exe 41 PID 2620 wrote to memory of 2544 2620 cmd.exe 41 PID 2592 wrote to memory of 1036 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 42 PID 2592 wrote to memory of 1036 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 42 PID 2592 wrote to memory of 1036 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 42 PID 2592 wrote to memory of 1036 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 42 PID 1036 wrote to memory of 2460 1036 cmd.exe 44 PID 1036 wrote to memory of 2460 1036 cmd.exe 44 PID 1036 wrote to memory of 2460 1036 cmd.exe 44 PID 1036 wrote to memory of 2460 1036 cmd.exe 44 PID 2592 wrote to memory of 1676 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 45 PID 2592 wrote to memory of 1676 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 45 PID 2592 wrote to memory of 1676 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 45 PID 2592 wrote to memory of 1676 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 45 PID 2592 wrote to memory of 1552 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 46 PID 2592 wrote to memory of 1552 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 46 PID 2592 wrote to memory of 1552 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 46 PID 2592 wrote to memory of 1552 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 46 PID 2592 wrote to memory of 1820 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 47 PID 2592 wrote to memory of 1820 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 47 PID 2592 wrote to memory of 1820 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 47 PID 2592 wrote to memory of 1820 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 47 PID 2592 wrote to memory of 1760 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 48 PID 2592 wrote to memory of 1760 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 48 PID 2592 wrote to memory of 1760 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 48 PID 2592 wrote to memory of 1760 2592 2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe 48 PID 1760 wrote to memory of 1836 1760 cmd.exe 53 PID 1760 wrote to memory of 1836 1760 cmd.exe 53 PID 1760 wrote to memory of 1836 1760 cmd.exe 53 PID 1760 wrote to memory of 1836 1760 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\MEscAkMo\GCwksMAI.exe"C:\Users\Admin\MEscAkMo\GCwksMAI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2056
-
-
C:\ProgramData\MqEMwoUY\ogUsQUkA.exe"C:\ProgramData\MqEMwoUY\ogUsQUkA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:856
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"6⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"8⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"10⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"12⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"14⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"16⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"18⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"20⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"22⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"24⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"26⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"28⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"30⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"32⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"34⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"36⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"38⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"40⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"42⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"44⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"46⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"48⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"50⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"52⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"54⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"56⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"58⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"60⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"62⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"64⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock65⤵PID:344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"66⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock67⤵PID:2016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"68⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock69⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"70⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock71⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"72⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock73⤵PID:356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"74⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock75⤵PID:1028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"76⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock77⤵PID:596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"78⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock79⤵PID:384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"80⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock81⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"82⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock83⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"84⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock85⤵PID:2124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"86⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock87⤵PID:2524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"88⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock89⤵PID:2292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"90⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock91⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"92⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock93⤵PID:2956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"94⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock95⤵PID:356
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"96⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock97⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"98⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock99⤵PID:1756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"100⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock101⤵PID:1840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"102⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock103⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"104⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock105⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"106⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock107⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"108⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock109⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"110⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock111⤵PID:404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"112⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock113⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"114⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock115⤵PID:1380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"116⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock117⤵PID:1844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"118⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock119⤵PID:300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"120⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock121⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-11_139918518fe0162c1ee92388bb5a7ce0_virlock"122⤵PID:2796
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-