Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-05_27221bc4ee503865d120544392693472_virlock.exe
-
Size
110KB
-
MD5
27221bc4ee503865d120544392693472
-
SHA1
d7d5e3bac78ac5f3a1b42f5782c2cc85eacb330a
-
SHA256
61bc2d8c1c22d07d0151ed8e73be389091ac6bc140fc2b81f5c2b213e174b8be
-
SHA512
045a899b1a2473c2b95dfbcdde304309a4bdceee0eac28d8f4540cda474c3e037efe55c5b6ee185fab77941c87bbd09ba66aef576d39044b4eb3bfede7b6b09f
-
SSDEEP
3072:tTQ53wX+p7u7tkla3Ipj9uIRfoKnXRtMJd2POiiGBxYVh:9LEi7tJufftMJd2PCGbYVh
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\Control Panel\International\Geo\Nation MaEAIowI.exe -
Executes dropped EXE 2 IoCs
pid Process 640 mmcoMUgE.exe 2996 MaEAIowI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mmcoMUgE.exe = "C:\\Users\\Admin\\YaIkooMg\\mmcoMUgE.exe" 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MaEAIowI.exe = "C:\\ProgramData\\YAMAQcEk\\MaEAIowI.exe" 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3642458265-1901903390-453309326-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mmcoMUgE.exe = "C:\\Users\\Admin\\YaIkooMg\\mmcoMUgE.exe" mmcoMUgE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MaEAIowI.exe = "C:\\ProgramData\\YAMAQcEk\\MaEAIowI.exe" MaEAIowI.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shell32.dll.exe mmcoMUgE.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe mmcoMUgE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 3804 reg.exe 1904 reg.exe 3432 reg.exe 3276 reg.exe 1744 reg.exe 3160 reg.exe 2912 reg.exe 1412 reg.exe 3044 reg.exe 2132 reg.exe 1928 reg.exe 1152 reg.exe 4828 reg.exe 3352 reg.exe 4380 reg.exe 4312 reg.exe 1356 reg.exe 860 reg.exe 1780 reg.exe 4908 reg.exe 4656 reg.exe 4356 reg.exe 4260 reg.exe 4932 reg.exe 656 reg.exe 4540 reg.exe 888 reg.exe 4628 reg.exe 3764 reg.exe 4696 reg.exe 2936 reg.exe 1876 reg.exe 4136 reg.exe 2056 reg.exe 2624 reg.exe 4632 reg.exe 4052 reg.exe 4416 reg.exe 3112 reg.exe 1180 reg.exe 4416 reg.exe 3544 reg.exe 2232 reg.exe 2976 reg.exe 412 reg.exe 4548 reg.exe 752 reg.exe 1184 reg.exe 2908 reg.exe 4044 reg.exe 1264 reg.exe 4136 reg.exe 3060 reg.exe 1636 reg.exe 2616 reg.exe 232 reg.exe 2772 reg.exe 2216 reg.exe 3088 reg.exe 3068 reg.exe 2972 reg.exe 2908 reg.exe 3520 reg.exe 3556 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2824 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4632 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4632 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4632 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4632 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3104 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3104 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3104 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3104 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1936 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1936 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1936 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1936 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 3776 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4820 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2728 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2728 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2728 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2728 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4312 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4312 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4312 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4312 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2568 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2568 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2568 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 2568 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1160 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1160 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1160 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 1160 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4444 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4444 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4444 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 4444 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 224 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 224 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 224 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 224 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 MaEAIowI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe 2996 MaEAIowI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 640 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 83 PID 4964 wrote to memory of 640 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 83 PID 4964 wrote to memory of 640 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 83 PID 4964 wrote to memory of 2996 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 84 PID 4964 wrote to memory of 2996 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 84 PID 4964 wrote to memory of 2996 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 84 PID 4964 wrote to memory of 3508 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 85 PID 4964 wrote to memory of 3508 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 85 PID 4964 wrote to memory of 3508 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 85 PID 4964 wrote to memory of 1596 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 87 PID 4964 wrote to memory of 1596 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 87 PID 4964 wrote to memory of 1596 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 87 PID 4964 wrote to memory of 708 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 88 PID 4964 wrote to memory of 708 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 88 PID 4964 wrote to memory of 708 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 88 PID 4964 wrote to memory of 3068 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 89 PID 4964 wrote to memory of 3068 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 89 PID 4964 wrote to memory of 3068 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 89 PID 4964 wrote to memory of 1900 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 90 PID 4964 wrote to memory of 1900 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 90 PID 4964 wrote to memory of 1900 4964 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 90 PID 3508 wrote to memory of 2524 3508 cmd.exe 91 PID 3508 wrote to memory of 2524 3508 cmd.exe 91 PID 3508 wrote to memory of 2524 3508 cmd.exe 91 PID 1900 wrote to memory of 232 1900 cmd.exe 96 PID 1900 wrote to memory of 232 1900 cmd.exe 96 PID 1900 wrote to memory of 232 1900 cmd.exe 96 PID 2524 wrote to memory of 1868 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 97 PID 2524 wrote to memory of 1868 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 97 PID 2524 wrote to memory of 1868 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 97 PID 1868 wrote to memory of 920 1868 cmd.exe 99 PID 1868 wrote to memory of 920 1868 cmd.exe 99 PID 1868 wrote to memory of 920 1868 cmd.exe 99 PID 2524 wrote to memory of 1380 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 100 PID 2524 wrote to memory of 1380 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 100 PID 2524 wrote to memory of 1380 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 100 PID 2524 wrote to memory of 1244 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 101 PID 2524 wrote to memory of 1244 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 101 PID 2524 wrote to memory of 1244 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 101 PID 2524 wrote to memory of 628 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 102 PID 2524 wrote to memory of 628 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 102 PID 2524 wrote to memory of 628 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 102 PID 2524 wrote to memory of 4528 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 103 PID 2524 wrote to memory of 4528 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 103 PID 2524 wrote to memory of 4528 2524 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 103 PID 4528 wrote to memory of 2844 4528 cmd.exe 108 PID 4528 wrote to memory of 2844 4528 cmd.exe 108 PID 4528 wrote to memory of 2844 4528 cmd.exe 108 PID 920 wrote to memory of 3520 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 109 PID 920 wrote to memory of 3520 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 109 PID 920 wrote to memory of 3520 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 109 PID 3520 wrote to memory of 2824 3520 cmd.exe 111 PID 3520 wrote to memory of 2824 3520 cmd.exe 111 PID 3520 wrote to memory of 2824 3520 cmd.exe 111 PID 920 wrote to memory of 4496 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 112 PID 920 wrote to memory of 4496 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 112 PID 920 wrote to memory of 4496 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 112 PID 920 wrote to memory of 4296 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 113 PID 920 wrote to memory of 4296 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 113 PID 920 wrote to memory of 4296 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 113 PID 920 wrote to memory of 4840 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 114 PID 920 wrote to memory of 4840 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 114 PID 920 wrote to memory of 4840 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 114 PID 920 wrote to memory of 1180 920 2024-07-05_27221bc4ee503865d120544392693472_virlock.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\YaIkooMg\mmcoMUgE.exe"C:\Users\Admin\YaIkooMg\mmcoMUgE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:640
-
-
C:\ProgramData\YAMAQcEk\MaEAIowI.exe"C:\ProgramData\YAMAQcEk\MaEAIowI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2996
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"8⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"10⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"12⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"14⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"16⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"18⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"20⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"22⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"24⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"26⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"28⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"30⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"32⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock33⤵PID:2420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"34⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock35⤵PID:1572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"36⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock37⤵PID:4612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"38⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock39⤵PID:1688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"40⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock41⤵PID:1184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"42⤵PID:1480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV143⤵PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock43⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"44⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock45⤵PID:2796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"46⤵PID:656
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock47⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"48⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock49⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"50⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock51⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"52⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock53⤵PID:1952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"54⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock55⤵PID:2984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"56⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock57⤵PID:2964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"58⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock59⤵PID:2596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"60⤵PID:4544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV161⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock61⤵PID:4932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"62⤵PID:3796
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock63⤵PID:3244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"64⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock65⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"66⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock67⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"68⤵PID:5076
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:984
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock69⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"70⤵PID:3912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:5024
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock71⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"72⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock73⤵PID:2740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"74⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock75⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"76⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock77⤵PID:1760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"78⤵PID:4312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:3764
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock79⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"80⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock81⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"82⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock83⤵PID:1292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"84⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock85⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"86⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock87⤵PID:4708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"88⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock89⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"90⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock91⤵PID:4484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"92⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock93⤵PID:2812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"94⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock95⤵PID:1552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"96⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock97⤵PID:2496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"98⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock99⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"100⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock101⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"102⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock103⤵PID:456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"104⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock105⤵PID:3764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"106⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock107⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"108⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock109⤵PID:2216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"110⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock111⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"112⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock113⤵PID:2000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"114⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock115⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"116⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock117⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"118⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock119⤵PID:3076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"120⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock121⤵PID:1736
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_27221bc4ee503865d120544392693472_virlock"122⤵PID:5104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-