Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/07/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe
-
Size
115KB
-
MD5
3f107c6867b6a798fdd26082e70ce102
-
SHA1
8133b8696820cb77c5eda16e37591e5a70572f26
-
SHA256
0115cbe12aa150b7d5ca5127d5ce6bdef6ceb39b01464752f9cab17c507a2a5a
-
SHA512
a5339c2007f24ff40055c7c87c6c8542fb4bad7213346939ab8526367a27622a7931c66e3ce4fd96c810c0e49530e179619c613af40730cfb82bdac6b0379330
-
SSDEEP
3072:/xp47Qtx1PYfyjT4ehwOqfJv+Ji+c0JQ/zDfe483cyPMulqB9:pp47qvAfwofJGJi+cC0zze483Rc9
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation UqMAAoog.exe -
Executes dropped EXE 2 IoCs
pid Process 4984 AKwIAkEw.exe 4696 UqMAAoog.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AKwIAkEw.exe = "C:\\Users\\Admin\\kuEAAUUQ\\AKwIAkEw.exe" 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UqMAAoog.exe = "C:\\ProgramData\\hAUoAowI\\UqMAAoog.exe" 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AKwIAkEw.exe = "C:\\Users\\Admin\\kuEAAUUQ\\AKwIAkEw.exe" AKwIAkEw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\UqMAAoog.exe = "C:\\ProgramData\\hAUoAowI\\UqMAAoog.exe" UqMAAoog.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe AKwIAkEw.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe AKwIAkEw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4892 reg.exe 4744 reg.exe 2120 reg.exe 2072 reg.exe 3580 reg.exe 4312 reg.exe 1220 reg.exe 2180 reg.exe 4080 reg.exe 440 reg.exe 2912 reg.exe 3700 reg.exe 1376 reg.exe 2360 reg.exe 4252 reg.exe 1032 reg.exe 3264 reg.exe 1476 reg.exe 2904 reg.exe 1260 reg.exe 4528 reg.exe 3948 reg.exe 1868 reg.exe 4572 reg.exe 4584 reg.exe 4520 reg.exe 1288 reg.exe 1824 reg.exe 4296 reg.exe 3728 reg.exe 1936 reg.exe 4712 reg.exe 2968 reg.exe 5056 reg.exe 4728 reg.exe 2684 reg.exe 3724 reg.exe 1928 reg.exe 4908 reg.exe 4184 reg.exe 2444 reg.exe 1820 reg.exe 2968 reg.exe 3772 reg.exe 4980 reg.exe 4948 reg.exe 4024 reg.exe 2480 reg.exe 316 reg.exe 5100 reg.exe 5052 reg.exe 1896 reg.exe 3580 reg.exe 4484 reg.exe 4388 reg.exe 1492 reg.exe 3976 reg.exe 1828 reg.exe 4976 reg.exe 3360 reg.exe 3100 reg.exe 4308 reg.exe 3600 reg.exe 3772 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 764 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 764 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 764 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 764 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4784 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4784 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4784 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4784 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 2744 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 2744 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 2744 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 2744 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4444 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4444 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4444 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4444 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3560 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3560 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3560 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 3560 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4064 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4064 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4064 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4064 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4988 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4988 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4988 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4988 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4432 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4432 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4432 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4432 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 1944 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 1944 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 1944 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 1944 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4768 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4768 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4768 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4768 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 5036 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 5036 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 5036 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 5036 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4604 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4604 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4604 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4604 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4044 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4044 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4044 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 4044 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4696 UqMAAoog.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe 4696 UqMAAoog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4252 wrote to memory of 4984 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 81 PID 4252 wrote to memory of 4984 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 81 PID 4252 wrote to memory of 4984 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 81 PID 4252 wrote to memory of 4696 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 82 PID 4252 wrote to memory of 4696 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 82 PID 4252 wrote to memory of 4696 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 82 PID 4252 wrote to memory of 4764 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 83 PID 4252 wrote to memory of 4764 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 83 PID 4252 wrote to memory of 4764 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 83 PID 4764 wrote to memory of 3956 4764 cmd.exe 85 PID 4764 wrote to memory of 3956 4764 cmd.exe 85 PID 4764 wrote to memory of 3956 4764 cmd.exe 85 PID 4252 wrote to memory of 1260 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 86 PID 4252 wrote to memory of 1260 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 86 PID 4252 wrote to memory of 1260 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 86 PID 4252 wrote to memory of 1288 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 87 PID 4252 wrote to memory of 1288 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 87 PID 4252 wrote to memory of 1288 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 87 PID 4252 wrote to memory of 704 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 88 PID 4252 wrote to memory of 704 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 88 PID 4252 wrote to memory of 704 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 88 PID 4252 wrote to memory of 4064 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 89 PID 4252 wrote to memory of 4064 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 89 PID 4252 wrote to memory of 4064 4252 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 89 PID 4064 wrote to memory of 2584 4064 cmd.exe 94 PID 4064 wrote to memory of 2584 4064 cmd.exe 94 PID 4064 wrote to memory of 2584 4064 cmd.exe 94 PID 3956 wrote to memory of 4456 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 95 PID 3956 wrote to memory of 4456 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 95 PID 3956 wrote to memory of 4456 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 95 PID 4456 wrote to memory of 3048 4456 cmd.exe 97 PID 4456 wrote to memory of 3048 4456 cmd.exe 97 PID 4456 wrote to memory of 3048 4456 cmd.exe 97 PID 3956 wrote to memory of 1420 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 98 PID 3956 wrote to memory of 1420 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 98 PID 3956 wrote to memory of 1420 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 98 PID 3956 wrote to memory of 1220 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 99 PID 3956 wrote to memory of 1220 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 99 PID 3956 wrote to memory of 1220 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 99 PID 3956 wrote to memory of 3768 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 100 PID 3956 wrote to memory of 3768 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 100 PID 3956 wrote to memory of 3768 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 100 PID 3956 wrote to memory of 3576 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 101 PID 3956 wrote to memory of 3576 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 101 PID 3956 wrote to memory of 3576 3956 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 101 PID 3576 wrote to memory of 3148 3576 cmd.exe 106 PID 3576 wrote to memory of 3148 3576 cmd.exe 106 PID 3576 wrote to memory of 3148 3576 cmd.exe 106 PID 3048 wrote to memory of 944 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 107 PID 3048 wrote to memory of 944 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 107 PID 3048 wrote to memory of 944 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 107 PID 3048 wrote to memory of 4372 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 109 PID 3048 wrote to memory of 4372 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 109 PID 3048 wrote to memory of 4372 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 109 PID 3048 wrote to memory of 3488 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 110 PID 3048 wrote to memory of 3488 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 110 PID 3048 wrote to memory of 3488 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 110 PID 3048 wrote to memory of 1224 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 111 PID 3048 wrote to memory of 1224 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 111 PID 3048 wrote to memory of 1224 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 111 PID 3048 wrote to memory of 2828 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 112 PID 3048 wrote to memory of 2828 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 112 PID 3048 wrote to memory of 2828 3048 2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe 112 PID 2828 wrote to memory of 4988 2828 cmd.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\kuEAAUUQ\AKwIAkEw.exe"C:\Users\Admin\kuEAAUUQ\AKwIAkEw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4984
-
-
C:\ProgramData\hAUoAowI\UqMAAoog.exe"C:\ProgramData\hAUoAowI\UqMAAoog.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"6⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"8⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"10⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"12⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"14⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"16⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"18⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"20⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"22⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"24⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"26⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"28⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"30⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"32⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock33⤵PID:3488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"34⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock35⤵PID:2612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"36⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock37⤵PID:4632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"38⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock39⤵PID:4092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"40⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock41⤵PID:3788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"42⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock43⤵PID:1340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"44⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock45⤵PID:4024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"46⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock47⤵PID:2760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"48⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock49⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"50⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock51⤵PID:5008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"52⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock53⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"54⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock55⤵PID:4692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"56⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock57⤵PID:2336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"58⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock59⤵PID:4648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"60⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock61⤵PID:4160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"62⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock63⤵PID:4428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"64⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock65⤵PID:2024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"66⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock67⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"68⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock69⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"70⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock71⤵PID:1344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"72⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock73⤵PID:4936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"74⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock75⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"76⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock77⤵PID:704
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"78⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock79⤵PID:4736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"80⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock81⤵PID:4868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"82⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock83⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"84⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock85⤵PID:2296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"86⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock87⤵PID:4312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"88⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock89⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"90⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock91⤵PID:1020
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"92⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock93⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"94⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock95⤵PID:2480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"96⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock97⤵PID:3052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"98⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock99⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"100⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock101⤵PID:1940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"102⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock103⤵PID:1224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"104⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock105⤵PID:1232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"106⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock107⤵PID:3724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"108⤵PID:1112
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1109⤵PID:4892
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock109⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"110⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock111⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"112⤵PID:2748
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock113⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"114⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock115⤵PID:1596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"116⤵PID:4480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:3296
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock117⤵PID:1120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"118⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock119⤵PID:2040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"120⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock121⤵PID:752
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-03_3f107c6867b6a798fdd26082e70ce102_virlock"122⤵PID:1852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-