Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 06:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe
-
Size
250KB
-
MD5
090aff281cdc6881941e7d6dd7b92cc1
-
SHA1
59e04c57a0aeac43467d7e599967210d28ee0961
-
SHA256
2f077e0177b227ebb2c6305b0c128144ad93e4b232ddb669cb085ff328abfbe1
-
SHA512
9bf29a84838a8149f9a0ccc859c858351f5c4bbfcda7852ed98c457e1a802d1ef9db7bc554c311134f3452fd642adf89cdff4af174dfde18ba7d8d15c32b64f9
-
SSDEEP
6144:4Pk2L6IJZkRVITbkS397+pcJY3BnVupbp:mHuBHIT4Gp+lnVupb
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 4440 TeAQIgkg.exe 4120 sUkAgYMo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TeAQIgkg.exe = "C:\\Users\\Admin\\WkQAQMgI\\TeAQIgkg.exe" TeAQIgkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sUkAgYMo.exe = "C:\\ProgramData\\JIkAsosA\\sUkAgYMo.exe" sUkAgYMo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\TeAQIgkg.exe = "C:\\Users\\Admin\\WkQAQMgI\\TeAQIgkg.exe" 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\sUkAgYMo.exe = "C:\\ProgramData\\JIkAsosA\\sUkAgYMo.exe" 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 336 4440 WerFault.exe 80 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 3692 reg.exe 4040 reg.exe 3224 reg.exe 2580 reg.exe 4284 reg.exe 3060 reg.exe 1584 reg.exe 1252 reg.exe 2652 reg.exe 1844 reg.exe 1720 reg.exe 3080 reg.exe 1184 reg.exe 2756 reg.exe 664 reg.exe 1844 reg.exe 1612 reg.exe 4940 reg.exe 4028 reg.exe 1404 reg.exe 1988 reg.exe 3500 reg.exe 4224 reg.exe 4380 reg.exe 4376 reg.exe 4808 reg.exe 116 reg.exe 4904 reg.exe 4824 reg.exe 3196 reg.exe 4252 reg.exe 4656 reg.exe 4332 reg.exe 2120 reg.exe 2896 reg.exe 3496 reg.exe 4620 reg.exe 4072 reg.exe 648 reg.exe 2288 reg.exe 3024 reg.exe 512 reg.exe 4264 reg.exe 4352 reg.exe 1156 reg.exe 2360 reg.exe 4344 reg.exe 4232 reg.exe 3224 reg.exe 2928 reg.exe 2340 reg.exe 1308 reg.exe 2312 reg.exe 336 reg.exe 1360 reg.exe 4076 reg.exe 116 reg.exe 2996 reg.exe 4716 reg.exe 1084 reg.exe 4988 reg.exe 3424 reg.exe 3772 reg.exe 4412 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3964 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3964 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3964 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3964 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2132 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2132 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2132 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2132 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4720 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4720 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4720 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4720 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 1656 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 1656 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 1656 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 1656 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3688 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3688 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3688 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3688 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4364 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4992 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4992 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4992 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4992 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4344 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4344 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4344 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4344 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2128 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2128 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2128 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 2128 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4664 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4664 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4664 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 4664 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3632 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3632 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3632 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 3632 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 5028 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 5028 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 5028 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 5028 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3264 wrote to memory of 4440 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 80 PID 3264 wrote to memory of 4440 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 80 PID 3264 wrote to memory of 4440 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 80 PID 3264 wrote to memory of 4120 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 81 PID 3264 wrote to memory of 4120 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 81 PID 3264 wrote to memory of 4120 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 81 PID 3264 wrote to memory of 4808 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 82 PID 3264 wrote to memory of 4808 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 82 PID 3264 wrote to memory of 4808 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 82 PID 4808 wrote to memory of 3480 4808 cmd.exe 84 PID 4808 wrote to memory of 3480 4808 cmd.exe 84 PID 4808 wrote to memory of 3480 4808 cmd.exe 84 PID 3264 wrote to memory of 4196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 85 PID 3264 wrote to memory of 4196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 85 PID 3264 wrote to memory of 4196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 85 PID 3264 wrote to memory of 408 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 86 PID 3264 wrote to memory of 408 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 86 PID 3264 wrote to memory of 408 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 86 PID 3264 wrote to memory of 3712 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 87 PID 3264 wrote to memory of 3712 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 87 PID 3264 wrote to memory of 3712 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 87 PID 3264 wrote to memory of 2196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 88 PID 3264 wrote to memory of 2196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 88 PID 3264 wrote to memory of 2196 3264 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 88 PID 2196 wrote to memory of 4424 2196 cmd.exe 93 PID 2196 wrote to memory of 4424 2196 cmd.exe 93 PID 2196 wrote to memory of 4424 2196 cmd.exe 93 PID 3480 wrote to memory of 3552 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 94 PID 3480 wrote to memory of 3552 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 94 PID 3480 wrote to memory of 3552 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 94 PID 3552 wrote to memory of 4584 3552 cmd.exe 96 PID 3552 wrote to memory of 4584 3552 cmd.exe 96 PID 3552 wrote to memory of 4584 3552 cmd.exe 96 PID 3480 wrote to memory of 2008 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 97 PID 3480 wrote to memory of 2008 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 97 PID 3480 wrote to memory of 2008 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 97 PID 3480 wrote to memory of 3688 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 98 PID 3480 wrote to memory of 3688 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 98 PID 3480 wrote to memory of 3688 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 98 PID 3480 wrote to memory of 3960 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 99 PID 3480 wrote to memory of 3960 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 99 PID 3480 wrote to memory of 3960 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 99 PID 3480 wrote to memory of 4160 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 100 PID 3480 wrote to memory of 4160 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 100 PID 3480 wrote to memory of 4160 3480 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 100 PID 4160 wrote to memory of 1016 4160 cmd.exe 105 PID 4160 wrote to memory of 1016 4160 cmd.exe 105 PID 4160 wrote to memory of 1016 4160 cmd.exe 105 PID 4584 wrote to memory of 4464 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 106 PID 4584 wrote to memory of 4464 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 106 PID 4584 wrote to memory of 4464 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 106 PID 4464 wrote to memory of 3964 4464 cmd.exe 108 PID 4464 wrote to memory of 3964 4464 cmd.exe 108 PID 4464 wrote to memory of 3964 4464 cmd.exe 108 PID 4584 wrote to memory of 5084 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 109 PID 4584 wrote to memory of 5084 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 109 PID 4584 wrote to memory of 5084 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 109 PID 4584 wrote to memory of 4688 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 110 PID 4584 wrote to memory of 4688 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 110 PID 4584 wrote to memory of 4688 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 110 PID 4584 wrote to memory of 3288 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 111 PID 4584 wrote to memory of 3288 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 111 PID 4584 wrote to memory of 3288 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 111 PID 4584 wrote to memory of 4276 4584 2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\WkQAQMgI\TeAQIgkg.exe"C:\Users\Admin\WkQAQMgI\TeAQIgkg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 15043⤵
- Program crash
PID:336
-
-
-
C:\ProgramData\JIkAsosA\sUkAgYMo.exe"C:\ProgramData\JIkAsosA\sUkAgYMo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"8⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"10⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"12⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"14⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"16⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"18⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"20⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"22⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"24⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"26⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"28⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"30⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"32⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock33⤵PID:4556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"34⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock35⤵PID:2360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"36⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock37⤵PID:1332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"38⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock39⤵PID:1444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"40⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock41⤵PID:4204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"42⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock43⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"44⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock45⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"46⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock47⤵PID:3796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"48⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock49⤵PID:2408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"50⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock51⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"52⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock53⤵PID:2336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"54⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock55⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"56⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock57⤵PID:4940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"58⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock59⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"60⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock61⤵PID:2884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"62⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock63⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"64⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock65⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"66⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock67⤵PID:4080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"68⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock69⤵PID:1640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"70⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock71⤵PID:816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"72⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock73⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"74⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock75⤵PID:2956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"76⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock77⤵PID:3364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"78⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock79⤵PID:4116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"80⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock81⤵PID:2084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"82⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:664
-
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock83⤵PID:1360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"84⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock85⤵PID:1112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"86⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock87⤵PID:4004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"88⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock89⤵PID:588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"90⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock91⤵PID:3304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"92⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock93⤵PID:4860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"94⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock95⤵PID:2336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"96⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock97⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"98⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock99⤵PID:3216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"100⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock101⤵PID:2356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"102⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock103⤵PID:2756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"104⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock105⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"106⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock107⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"108⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock109⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"110⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock111⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"112⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock113⤵PID:2184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"114⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock115⤵PID:1016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"116⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock117⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"118⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock119⤵PID:60
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"120⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock121⤵PID:3720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-06-27_090aff281cdc6881941e7d6dd7b92cc1_virlock"122⤵PID:4632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-