Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe
-
Size
268KB
-
MD5
b8bfed7f47f26ff5def645a67f5e51b2
-
SHA1
e18dd5a4ebded19b2c48886ad33d8156131d712a
-
SHA256
821ed7784b8672643dd327c2a95b250ca129d4469f328008d3fc17f926e8f145
-
SHA512
67636a28d50baa7084f906e4dd062e9735878a58316fe4f192b048108116b30d70b490115480a1ee0c026f575c5754f7ee5ff1d85d9621e763916a3e5f818ae5
-
SSDEEP
6144:ZLF1uGrQurPTqhI32rBMSEqUyYpXm+t18/yiyOii:ZnCqq2DHt+Ki7F
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (60) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\International\Geo\Nation qigMkwQA.exe -
Deletes itself 1 IoCs
pid Process 1616 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2736 qigMkwQA.exe 3020 yYMoUAwk.exe -
Loads dropped DLL 20 IoCs
pid Process 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yYMoUAwk.exe = "C:\\ProgramData\\wyYcEgss\\yYMoUAwk.exe" 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\qigMkwQA.exe = "C:\\Users\\Admin\\ZmEUkkMU\\qigMkwQA.exe" qigMkwQA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\yYMoUAwk.exe = "C:\\ProgramData\\wyYcEgss\\yYMoUAwk.exe" yYMoUAwk.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeccggYc.exe = "C:\\Users\\Admin\\gKIMcsIA\\qeccggYc.exe" 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lmcQkcww.exe = "C:\\ProgramData\\WaIoUkEM\\lmcQkcww.exe" 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\qigMkwQA.exe = "C:\\Users\\Admin\\ZmEUkkMU\\qigMkwQA.exe" 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico qigMkwQA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1612 2644 WerFault.exe 318 1540 2536 WerFault.exe 320 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3036 reg.exe 1108 reg.exe 2676 reg.exe 1908 reg.exe 2300 reg.exe 1400 reg.exe 1772 reg.exe 2664 reg.exe 1192 reg.exe 2792 reg.exe 292 reg.exe 1828 reg.exe 2740 reg.exe 2520 reg.exe 2992 reg.exe 1588 reg.exe 2636 reg.exe 1508 reg.exe 2500 reg.exe 620 reg.exe 2236 reg.exe 1204 reg.exe 2788 reg.exe 2468 reg.exe 2156 reg.exe 1904 reg.exe 2440 reg.exe 2408 reg.exe 2696 reg.exe 1420 reg.exe 1668 reg.exe 2448 reg.exe 1504 reg.exe 1304 reg.exe 1868 reg.exe 752 reg.exe 1348 reg.exe 1192 reg.exe 2252 reg.exe 1592 reg.exe 1236 reg.exe 2144 reg.exe 2772 reg.exe 3044 reg.exe 2416 reg.exe 2280 reg.exe 2572 reg.exe 2872 reg.exe 2388 reg.exe 2876 reg.exe 2252 reg.exe 1484 reg.exe 2252 reg.exe 3004 reg.exe 2548 reg.exe 1560 reg.exe 2564 reg.exe 1384 reg.exe 1204 reg.exe 2708 reg.exe 2448 reg.exe 2900 reg.exe 316 reg.exe 2748 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1828 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1828 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 564 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 564 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2008 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2008 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2616 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2616 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2512 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2512 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2808 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2808 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1692 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1692 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2220 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2220 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2232 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2232 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1624 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1624 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2728 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2728 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1504 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1504 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 652 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 652 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2348 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2348 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 824 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 824 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2812 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2812 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2928 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2928 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1912 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1912 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1336 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1336 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1896 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1896 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1940 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1940 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 748 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 748 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2488 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2488 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1628 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1628 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2696 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2696 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1000 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1000 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 824 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 824 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2556 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 2556 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1012 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 1012 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 qigMkwQA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe 2736 qigMkwQA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2736 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 28 PID 2400 wrote to memory of 2736 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 28 PID 2400 wrote to memory of 2736 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 28 PID 2400 wrote to memory of 2736 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 28 PID 2400 wrote to memory of 3020 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 29 PID 2400 wrote to memory of 3020 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 29 PID 2400 wrote to memory of 3020 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 29 PID 2400 wrote to memory of 3020 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 29 PID 2400 wrote to memory of 2588 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 30 PID 2400 wrote to memory of 2588 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 30 PID 2400 wrote to memory of 2588 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 30 PID 2400 wrote to memory of 2588 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 30 PID 2588 wrote to memory of 2632 2588 cmd.exe 33 PID 2588 wrote to memory of 2632 2588 cmd.exe 33 PID 2588 wrote to memory of 2632 2588 cmd.exe 33 PID 2588 wrote to memory of 2632 2588 cmd.exe 33 PID 2400 wrote to memory of 2704 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 32 PID 2400 wrote to memory of 2704 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 32 PID 2400 wrote to memory of 2704 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 32 PID 2400 wrote to memory of 2704 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 32 PID 2400 wrote to memory of 2960 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 34 PID 2400 wrote to memory of 2960 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 34 PID 2400 wrote to memory of 2960 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 34 PID 2400 wrote to memory of 2960 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 34 PID 2400 wrote to memory of 2620 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 35 PID 2400 wrote to memory of 2620 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 35 PID 2400 wrote to memory of 2620 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 35 PID 2400 wrote to memory of 2620 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 35 PID 2400 wrote to memory of 2640 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 36 PID 2400 wrote to memory of 2640 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 36 PID 2400 wrote to memory of 2640 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 36 PID 2400 wrote to memory of 2640 2400 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 36 PID 2640 wrote to memory of 2900 2640 cmd.exe 41 PID 2640 wrote to memory of 2900 2640 cmd.exe 41 PID 2640 wrote to memory of 2900 2640 cmd.exe 41 PID 2640 wrote to memory of 2900 2640 cmd.exe 41 PID 2632 wrote to memory of 1548 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 42 PID 2632 wrote to memory of 1548 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 42 PID 2632 wrote to memory of 1548 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 42 PID 2632 wrote to memory of 1548 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 42 PID 1548 wrote to memory of 1828 1548 cmd.exe 44 PID 1548 wrote to memory of 1828 1548 cmd.exe 44 PID 1548 wrote to memory of 1828 1548 cmd.exe 44 PID 1548 wrote to memory of 1828 1548 cmd.exe 44 PID 2632 wrote to memory of 2696 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 45 PID 2632 wrote to memory of 2696 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 45 PID 2632 wrote to memory of 2696 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 45 PID 2632 wrote to memory of 2696 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 45 PID 2632 wrote to memory of 2532 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 46 PID 2632 wrote to memory of 2532 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 46 PID 2632 wrote to memory of 2532 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 46 PID 2632 wrote to memory of 2532 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 46 PID 2632 wrote to memory of 2652 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 47 PID 2632 wrote to memory of 2652 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 47 PID 2632 wrote to memory of 2652 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 47 PID 2632 wrote to memory of 2652 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 47 PID 2632 wrote to memory of 2684 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 48 PID 2632 wrote to memory of 2684 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 48 PID 2632 wrote to memory of 2684 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 48 PID 2632 wrote to memory of 2684 2632 2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe 48 PID 2684 wrote to memory of 1568 2684 cmd.exe 53 PID 2684 wrote to memory of 1568 2684 cmd.exe 53 PID 2684 wrote to memory of 1568 2684 cmd.exe 53 PID 2684 wrote to memory of 1568 2684 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\ZmEUkkMU\qigMkwQA.exe"C:\Users\Admin\ZmEUkkMU\qigMkwQA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2736
-
-
C:\ProgramData\wyYcEgss\yYMoUAwk.exe"C:\ProgramData\wyYcEgss\yYMoUAwk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3020
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"6⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"8⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"10⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"12⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"14⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"16⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"18⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"20⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"22⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"24⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"26⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"28⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"30⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"32⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"34⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"36⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"38⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"40⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"42⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"44⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"46⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"48⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock49⤵
- Adds Run key to start application
PID:840 -
C:\Users\Admin\gKIMcsIA\qeccggYc.exe"C:\Users\Admin\gKIMcsIA\qeccggYc.exe"50⤵PID:2644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 3651⤵
- Program crash
PID:1612
-
-
-
C:\ProgramData\WaIoUkEM\lmcQkcww.exe"C:\ProgramData\WaIoUkEM\lmcQkcww.exe"50⤵PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 3651⤵
- Program crash
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"50⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"52⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"54⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"56⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"58⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"60⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"62⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"64⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock65⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"66⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock67⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"68⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock69⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"70⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock71⤵PID:1512
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"72⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock73⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"74⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock75⤵PID:760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"76⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock77⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"78⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock79⤵PID:568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"80⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock81⤵PID:676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"82⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock83⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"84⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock85⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"86⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock87⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"88⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock89⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"90⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock91⤵PID:2592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"92⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock93⤵PID:1420
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"94⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock95⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"96⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock97⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"98⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock99⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"100⤵PID:264
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock101⤵PID:1296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"102⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock103⤵PID:2692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"104⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock105⤵PID:344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"106⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock107⤵PID:1536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"108⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock109⤵PID:1852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"110⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock111⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"112⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock113⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"114⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock115⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"116⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock117⤵PID:2184
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"118⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock119⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"120⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock121⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-06-14_b8bfed7f47f26ff5def645a67f5e51b2_virlock"122⤵PID:2764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-