Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 12:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe
-
Size
200KB
-
MD5
c88280ac33f2ccd30f0cdbd94a3a10c4
-
SHA1
f87b648a0f2182a3570ab15eed12d1bcc31d88fe
-
SHA256
3584d64fa6a83419029dc7cda25ec55eae2045c85ac8f0cf1d65c07e016f6cc2
-
SHA512
123d40861a8b4730e30d3eb6cda76b3967cb432543b63c702b12f6265ad875ffcbb36da11f4c7be9c32a280eeb763595b06d5941c6da5f8bac3e41b26f7623a8
-
SSDEEP
3072:OvScscUw/8gzVisOBRO95UOaZEgETCJxGj+siwjiS3IgcNrPmL:mgcH88nQRO9r6aTM8yIRIpFP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 43 2268 Process not Found 45 2268 Process not Found -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation KqkEgwgk.exe -
Executes dropped EXE 2 IoCs
pid Process 4276 KqkEgwgk.exe 3584 hgoUoIoY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hgoUoIoY.exe = "C:\\ProgramData\\nesoIows\\hgoUoIoY.exe" 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KqkEgwgk.exe = "C:\\Users\\Admin\\UgYQMYko\\KqkEgwgk.exe" KqkEgwgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\hgoUoIoY.exe = "C:\\ProgramData\\nesoIows\\hgoUoIoY.exe" hgoUoIoY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QCUcEUYM.exe = "C:\\Users\\Admin\\ZYcsYAQU\\QCUcEUYM.exe" 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ywEsMggo.exe = "C:\\ProgramData\\wuMkoMYY\\ywEsMggo.exe" 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KqkEgwgk.exe = "C:\\Users\\Admin\\UgYQMYko\\KqkEgwgk.exe" 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1268 2084 WerFault.exe 472 60 3312 WerFault.exe 473 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2244 reg.exe 5116 reg.exe 4432 Process not Found 1064 reg.exe 4852 reg.exe 4424 reg.exe 2760 reg.exe 2916 Process not Found 4888 reg.exe 5068 reg.exe 2624 reg.exe 3748 reg.exe 3792 reg.exe 2524 reg.exe 624 reg.exe 4668 reg.exe 4352 Process not Found 4324 reg.exe 2940 reg.exe 1568 reg.exe 2692 reg.exe 1396 reg.exe 4976 reg.exe 1228 reg.exe 2760 reg.exe 4144 reg.exe 4928 reg.exe 4588 reg.exe 4216 reg.exe 4084 reg.exe 2392 reg.exe 1052 reg.exe 2168 reg.exe 4384 reg.exe 1508 reg.exe 648 reg.exe 4044 reg.exe 3512 reg.exe 4640 reg.exe 1092 reg.exe 4196 Process not Found 4860 Process not Found 4356 reg.exe 4488 reg.exe 4692 reg.exe 4576 Process not Found 3948 reg.exe 3748 reg.exe 2240 reg.exe 4656 reg.exe 2148 reg.exe 4608 reg.exe 1532 reg.exe 4856 reg.exe 2764 reg.exe 3604 reg.exe 2240 reg.exe 1924 reg.exe 4528 reg.exe 4216 reg.exe 2692 reg.exe 3448 Process not Found 1984 reg.exe 2816 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2272 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2272 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2272 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 2272 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 688 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 688 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 688 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 688 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4192 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4192 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4192 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4192 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4312 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4312 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4312 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 4312 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3496 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3496 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3496 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3496 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 5104 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 5104 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 5104 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 5104 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 1824 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 1824 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 1824 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 1824 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 380 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 380 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 380 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 380 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3736 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3736 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3736 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3736 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3184 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3184 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3184 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 3184 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 512 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 512 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 512 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 512 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 772 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4276 KqkEgwgk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe 4276 KqkEgwgk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4276 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 81 PID 4264 wrote to memory of 4276 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 81 PID 4264 wrote to memory of 4276 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 81 PID 4264 wrote to memory of 3584 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 82 PID 4264 wrote to memory of 3584 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 82 PID 4264 wrote to memory of 3584 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 82 PID 4264 wrote to memory of 4440 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 83 PID 4264 wrote to memory of 4440 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 83 PID 4264 wrote to memory of 4440 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 83 PID 4264 wrote to memory of 1928 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 85 PID 4264 wrote to memory of 1928 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 85 PID 4264 wrote to memory of 1928 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 85 PID 4264 wrote to memory of 700 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 86 PID 4264 wrote to memory of 700 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 86 PID 4264 wrote to memory of 700 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 86 PID 4264 wrote to memory of 2000 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 87 PID 4264 wrote to memory of 2000 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 87 PID 4264 wrote to memory of 2000 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 87 PID 4264 wrote to memory of 3468 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 88 PID 4264 wrote to memory of 3468 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 88 PID 4264 wrote to memory of 3468 4264 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 88 PID 4440 wrote to memory of 2372 4440 cmd.exe 93 PID 4440 wrote to memory of 2372 4440 cmd.exe 93 PID 4440 wrote to memory of 2372 4440 cmd.exe 93 PID 3468 wrote to memory of 852 3468 cmd.exe 94 PID 3468 wrote to memory of 852 3468 cmd.exe 94 PID 3468 wrote to memory of 852 3468 cmd.exe 94 PID 2372 wrote to memory of 3524 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 95 PID 2372 wrote to memory of 3524 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 95 PID 2372 wrote to memory of 3524 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 95 PID 3524 wrote to memory of 412 3524 cmd.exe 97 PID 3524 wrote to memory of 412 3524 cmd.exe 97 PID 3524 wrote to memory of 412 3524 cmd.exe 97 PID 2372 wrote to memory of 4356 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 98 PID 2372 wrote to memory of 4356 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 98 PID 2372 wrote to memory of 4356 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 98 PID 2372 wrote to memory of 2620 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 99 PID 2372 wrote to memory of 2620 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 99 PID 2372 wrote to memory of 2620 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 99 PID 2372 wrote to memory of 2108 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 100 PID 2372 wrote to memory of 2108 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 100 PID 2372 wrote to memory of 2108 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 100 PID 2372 wrote to memory of 1084 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 101 PID 2372 wrote to memory of 1084 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 101 PID 2372 wrote to memory of 1084 2372 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 101 PID 1084 wrote to memory of 3972 1084 cmd.exe 106 PID 1084 wrote to memory of 3972 1084 cmd.exe 106 PID 1084 wrote to memory of 3972 1084 cmd.exe 106 PID 412 wrote to memory of 1940 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 107 PID 412 wrote to memory of 1940 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 107 PID 412 wrote to memory of 1940 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 107 PID 1940 wrote to memory of 2272 1940 cmd.exe 109 PID 1940 wrote to memory of 2272 1940 cmd.exe 109 PID 1940 wrote to memory of 2272 1940 cmd.exe 109 PID 412 wrote to memory of 2760 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 110 PID 412 wrote to memory of 2760 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 110 PID 412 wrote to memory of 2760 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 110 PID 412 wrote to memory of 2132 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 111 PID 412 wrote to memory of 2132 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 111 PID 412 wrote to memory of 2132 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 111 PID 412 wrote to memory of 1984 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 112 PID 412 wrote to memory of 1984 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 112 PID 412 wrote to memory of 1984 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 112 PID 412 wrote to memory of 1964 412 2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\UgYQMYko\KqkEgwgk.exe"C:\Users\Admin\UgYQMYko\KqkEgwgk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4276
-
-
C:\ProgramData\nesoIows\hgoUoIoY.exe"C:\ProgramData\nesoIows\hgoUoIoY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"8⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"10⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"12⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"14⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"16⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"18⤵PID:3816
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"20⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"22⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"24⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"26⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"28⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"30⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"32⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock33⤵PID:3436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"34⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock35⤵PID:4640
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"36⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock37⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"38⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock39⤵PID:4424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"40⤵PID:3840
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock41⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"42⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock43⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"44⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock45⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"46⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock47⤵PID:1556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"48⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock49⤵PID:5092
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"50⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock51⤵PID:1320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"52⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock53⤵PID:1864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"54⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock55⤵PID:4304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"56⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock57⤵PID:1064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"58⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock59⤵PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"60⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock61⤵PID:1948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"62⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock63⤵PID:4232
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"64⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock65⤵
- Adds Run key to start application
PID:920 -
C:\Users\Admin\ZYcsYAQU\QCUcEUYM.exe"C:\Users\Admin\ZYcsYAQU\QCUcEUYM.exe"66⤵PID:2084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 22467⤵
- Program crash
PID:1268
-
-
-
C:\ProgramData\wuMkoMYY\ywEsMggo.exe"C:\ProgramData\wuMkoMYY\ywEsMggo.exe"66⤵PID:3312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 22467⤵
- Program crash
PID:60
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"66⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock67⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"68⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock69⤵PID:1248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"70⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock71⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"72⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock73⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"74⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock75⤵PID:4620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"76⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock77⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"78⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock79⤵PID:840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"80⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock81⤵PID:2952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"82⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock83⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"84⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock85⤵PID:4488
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"86⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock87⤵PID:3972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"88⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock89⤵PID:3316
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"90⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock91⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"92⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock93⤵PID:3596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"94⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock95⤵PID:4216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"96⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock97⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"98⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock99⤵PID:4120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"100⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock101⤵PID:3500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"102⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock103⤵PID:1800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"104⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock105⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"106⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock107⤵PID:1320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"108⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock109⤵PID:3948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"110⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock111⤵PID:1500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"112⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock113⤵PID:3736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"114⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock115⤵PID:2124
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"116⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock117⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"118⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock119⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"120⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock121⤵PID:5024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-04_c88280ac33f2ccd30f0cdbd94a3a10c4_virlock"122⤵PID:2468
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-