Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
-
Size
110KB
-
MD5
27221bc4ee503865d120544392693472
-
SHA1
d7d5e3bac78ac5f3a1b42f5782c2cc85eacb330a
-
SHA256
61bc2d8c1c22d07d0151ed8e73be389091ac6bc140fc2b81f5c2b213e174b8be
-
SHA512
045a899b1a2473c2b95dfbcdde304309a4bdceee0eac28d8f4540cda474c3e037efe55c5b6ee185fab77941c87bbd09ba66aef576d39044b4eb3bfede7b6b09f
-
SSDEEP
3072:tTQ53wX+p7u7tkla3Ipj9uIRfoKnXRtMJd2POiiGBxYVh:9LEi7tJufftMJd2PCGbYVh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Control Panel\International\Geo\Nation HogoAcUI.exe -
Executes dropped EXE 2 IoCs
pid Process 796 HogoAcUI.exe 2688 nIcosYkw.exe -
Loads dropped DLL 20 IoCs
pid Process 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HogoAcUI.exe = "C:\\Users\\Admin\\HwEYgQIM\\HogoAcUI.exe" 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nIcosYkw.exe = "C:\\ProgramData\\TmsQQUAk\\nIcosYkw.exe" 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\HogoAcUI.exe = "C:\\Users\\Admin\\HwEYgQIM\\HogoAcUI.exe" HogoAcUI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\nIcosYkw.exe = "C:\\ProgramData\\TmsQQUAk\\nIcosYkw.exe" nIcosYkw.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico HogoAcUI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1032 reg.exe 2752 reg.exe 1372 reg.exe 2092 reg.exe 1852 reg.exe 1800 reg.exe 2260 reg.exe 2388 reg.exe 2872 reg.exe 2304 reg.exe 2100 reg.exe 1544 reg.exe 1728 reg.exe 2740 reg.exe 1924 reg.exe 2460 reg.exe 984 reg.exe 2472 reg.exe 1260 reg.exe 2052 reg.exe 1516 reg.exe 1820 reg.exe 1784 reg.exe 984 reg.exe 2716 reg.exe 2292 reg.exe 1756 reg.exe 1628 reg.exe 2780 reg.exe 2956 reg.exe 3040 reg.exe 2892 reg.exe 2324 reg.exe 2760 reg.exe 2600 reg.exe 1852 reg.exe 1668 reg.exe 276 reg.exe 2784 reg.exe 1984 reg.exe 2644 reg.exe 1188 reg.exe 2740 reg.exe 2780 reg.exe 2612 reg.exe 2516 reg.exe 2212 reg.exe 2448 reg.exe 2508 reg.exe 2828 reg.exe 2024 reg.exe 2148 reg.exe 2252 reg.exe 1264 reg.exe 2152 reg.exe 1460 reg.exe 2244 reg.exe 2416 reg.exe 2388 reg.exe 1408 reg.exe 2892 reg.exe 276 reg.exe 2920 reg.exe 1696 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2900 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2900 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1652 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1652 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 352 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 352 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1512 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1512 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2500 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2500 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1940 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1940 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2704 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2704 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2252 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2252 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1620 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1620 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2272 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2272 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2220 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2220 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3004 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3004 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 496 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 496 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1528 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1528 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1692 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1692 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2428 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2428 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2584 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2584 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1684 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1684 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 848 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 848 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1684 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1684 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2900 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2900 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1784 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1784 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1752 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1752 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2228 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2228 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2872 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2872 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2624 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2624 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 796 HogoAcUI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe 796 HogoAcUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 796 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 29 PID 1760 wrote to memory of 796 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 29 PID 1760 wrote to memory of 796 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 29 PID 1760 wrote to memory of 796 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 29 PID 1760 wrote to memory of 2688 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 30 PID 1760 wrote to memory of 2688 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 30 PID 1760 wrote to memory of 2688 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 30 PID 1760 wrote to memory of 2688 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 30 PID 1760 wrote to memory of 2660 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 31 PID 1760 wrote to memory of 2660 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 31 PID 1760 wrote to memory of 2660 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 31 PID 1760 wrote to memory of 2660 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 31 PID 1760 wrote to memory of 3000 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 33 PID 1760 wrote to memory of 3000 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 33 PID 1760 wrote to memory of 3000 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 33 PID 1760 wrote to memory of 3000 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 33 PID 2660 wrote to memory of 2556 2660 cmd.exe 34 PID 2660 wrote to memory of 2556 2660 cmd.exe 34 PID 2660 wrote to memory of 2556 2660 cmd.exe 34 PID 2660 wrote to memory of 2556 2660 cmd.exe 34 PID 1760 wrote to memory of 2600 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 35 PID 1760 wrote to memory of 2600 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 35 PID 1760 wrote to memory of 2600 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 35 PID 1760 wrote to memory of 2600 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 35 PID 1760 wrote to memory of 2656 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 36 PID 1760 wrote to memory of 2656 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 36 PID 1760 wrote to memory of 2656 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 36 PID 1760 wrote to memory of 2656 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 36 PID 1760 wrote to memory of 2484 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 39 PID 1760 wrote to memory of 2484 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 39 PID 1760 wrote to memory of 2484 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 39 PID 1760 wrote to memory of 2484 1760 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 39 PID 2484 wrote to memory of 2436 2484 cmd.exe 42 PID 2484 wrote to memory of 2436 2484 cmd.exe 42 PID 2484 wrote to memory of 2436 2484 cmd.exe 42 PID 2484 wrote to memory of 2436 2484 cmd.exe 42 PID 2556 wrote to memory of 2728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 43 PID 2556 wrote to memory of 2728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 43 PID 2556 wrote to memory of 2728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 43 PID 2556 wrote to memory of 2728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 43 PID 2728 wrote to memory of 2900 2728 cmd.exe 45 PID 2728 wrote to memory of 2900 2728 cmd.exe 45 PID 2728 wrote to memory of 2900 2728 cmd.exe 45 PID 2728 wrote to memory of 2900 2728 cmd.exe 45 PID 2556 wrote to memory of 1852 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 46 PID 2556 wrote to memory of 1852 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 46 PID 2556 wrote to memory of 1852 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 46 PID 2556 wrote to memory of 1852 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 46 PID 2556 wrote to memory of 1876 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 47 PID 2556 wrote to memory of 1876 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 47 PID 2556 wrote to memory of 1876 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 47 PID 2556 wrote to memory of 1876 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 47 PID 2556 wrote to memory of 2724 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 49 PID 2556 wrote to memory of 2724 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 49 PID 2556 wrote to memory of 2724 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 49 PID 2556 wrote to memory of 2724 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 49 PID 2556 wrote to memory of 1728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 50 PID 2556 wrote to memory of 1728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 50 PID 2556 wrote to memory of 1728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 50 PID 2556 wrote to memory of 1728 2556 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 50 PID 1728 wrote to memory of 1796 1728 cmd.exe 54 PID 1728 wrote to memory of 1796 1728 cmd.exe 54 PID 1728 wrote to memory of 1796 1728 cmd.exe 54 PID 1728 wrote to memory of 1796 1728 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\HwEYgQIM\HogoAcUI.exe"C:\Users\Admin\HwEYgQIM\HogoAcUI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:796
-
-
C:\ProgramData\TmsQQUAk\nIcosYkw.exe"C:\ProgramData\TmsQQUAk\nIcosYkw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2688
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"6⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"8⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"10⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"12⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"14⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"16⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"18⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"20⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"22⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"24⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"26⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"28⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"30⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"32⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"34⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"36⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"38⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"40⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"42⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"44⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"46⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"48⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1684 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"50⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"52⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"54⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"56⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"58⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"60⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"62⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"64⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock65⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"66⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock67⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"68⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock69⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"70⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock71⤵PID:1040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"72⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock73⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"74⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock75⤵PID:2220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"76⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock77⤵PID:1328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"78⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock79⤵PID:1348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"80⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock81⤵PID:2584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"82⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock83⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"84⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock85⤵PID:2204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"86⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock87⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"88⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock89⤵PID:304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"90⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock91⤵PID:1456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"92⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock93⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"94⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock95⤵PID:2532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"96⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock97⤵PID:2944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"98⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock99⤵PID:1796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"100⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock101⤵PID:1140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"102⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock103⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"104⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock105⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"106⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock107⤵PID:2320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"108⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock109⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"110⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock111⤵PID:2120
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"112⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock113⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"114⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock115⤵PID:1140
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"116⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock117⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"118⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock119⤵PID:1720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"120⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock121⤵PID:2472
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"122⤵PID:1452
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-