Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe
-
Size
117KB
-
MD5
510df7297b8fc58e61240de0b057a3ec
-
SHA1
588642fea8582cc8f998e621108e19cf996a7685
-
SHA256
338a366ce094098ffd83fba25feaf918796a28ad18d82ac10e24376d7e4e069c
-
SHA512
3085767116c202c07c2ef9926aec7c19c183dc3949f935eaa7a73b9e6c714d68b7b5508e30ed36b70560eba96cf9544d8459d2f6d84a4836a98020e010e738ce
-
SSDEEP
1536:/0eUIanmCW7yQqb6HwXGlyNd8Fb6R6ydGea+p1lNyT1g6RI83nu9AjMA6HNT5Bp6:/0reyL2lcObheUE1lY1hb3oAj56LI
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\Control Panel\International\Geo\Nation NugEMEMo.exe -
Executes dropped EXE 2 IoCs
pid Process 4884 NugEMEMo.exe 2904 BqMAcIQA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BqMAcIQA.exe = "C:\\ProgramData\\DsEUUIAw\\BqMAcIQA.exe" 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NugEMEMo.exe = "C:\\Users\\Admin\\aoQQYIYc\\NugEMEMo.exe" NugEMEMo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\BqMAcIQA.exe = "C:\\ProgramData\\DsEUUIAw\\BqMAcIQA.exe" BqMAcIQA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2753856825-3907105642-1818461144-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NugEMEMo.exe = "C:\\Users\\Admin\\aoQQYIYc\\NugEMEMo.exe" 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4408 reg.exe 4388 reg.exe 2876 reg.exe 1632 reg.exe 1444 reg.exe 4604 reg.exe 516 reg.exe 3332 reg.exe 4876 reg.exe 1060 reg.exe 1004 reg.exe 3592 reg.exe 4740 reg.exe 2476 reg.exe 644 reg.exe 4576 reg.exe 1672 reg.exe 1564 reg.exe 836 reg.exe 1716 reg.exe 1780 reg.exe 4740 reg.exe 1192 reg.exe 4688 reg.exe 4412 reg.exe 3392 reg.exe 312 reg.exe 1844 reg.exe 2876 reg.exe 3460 reg.exe 2324 reg.exe 900 reg.exe 3656 reg.exe 4252 reg.exe 4932 reg.exe 740 reg.exe 2948 reg.exe 4636 reg.exe 736 reg.exe 2784 reg.exe 2304 reg.exe 1432 reg.exe 1228 reg.exe 1148 reg.exe 4396 reg.exe 2708 reg.exe 1368 reg.exe 2876 reg.exe 1636 reg.exe 4696 reg.exe 4156 reg.exe 2248 reg.exe 3344 reg.exe 2604 reg.exe 1112 reg.exe 2280 reg.exe 2304 reg.exe 4164 reg.exe 3624 reg.exe 4156 reg.exe 4508 reg.exe 2572 reg.exe 1780 reg.exe 2992 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2336 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2336 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2336 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2336 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4428 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4428 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4428 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4428 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4944 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4944 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4944 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4944 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1492 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1492 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1492 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 1492 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3876 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3876 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3876 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3876 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 5096 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 5096 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 5096 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 5096 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2812 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2812 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2812 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2812 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2632 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2632 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2632 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 2632 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 700 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 700 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 700 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 700 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3872 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3872 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3872 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 3872 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4488 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4488 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4488 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4488 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 540 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 540 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 540 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 540 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4516 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4516 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4516 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 4516 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4884 NugEMEMo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe 4884 NugEMEMo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4884 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 84 PID 1444 wrote to memory of 4884 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 84 PID 1444 wrote to memory of 4884 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 84 PID 1444 wrote to memory of 2904 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 85 PID 1444 wrote to memory of 2904 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 85 PID 1444 wrote to memory of 2904 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 85 PID 1444 wrote to memory of 2416 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 86 PID 1444 wrote to memory of 2416 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 86 PID 1444 wrote to memory of 2416 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 86 PID 1444 wrote to memory of 516 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 89 PID 1444 wrote to memory of 516 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 89 PID 1444 wrote to memory of 516 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 89 PID 1444 wrote to memory of 2484 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 90 PID 1444 wrote to memory of 2484 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 90 PID 1444 wrote to memory of 2484 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 90 PID 1444 wrote to memory of 4856 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 91 PID 1444 wrote to memory of 4856 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 91 PID 1444 wrote to memory of 4856 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 91 PID 1444 wrote to memory of 2952 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 92 PID 1444 wrote to memory of 2952 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 92 PID 1444 wrote to memory of 2952 1444 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 92 PID 2416 wrote to memory of 3904 2416 cmd.exe 97 PID 2416 wrote to memory of 3904 2416 cmd.exe 97 PID 2416 wrote to memory of 3904 2416 cmd.exe 97 PID 2952 wrote to memory of 1564 2952 cmd.exe 98 PID 2952 wrote to memory of 1564 2952 cmd.exe 98 PID 2952 wrote to memory of 1564 2952 cmd.exe 98 PID 3904 wrote to memory of 2604 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 99 PID 3904 wrote to memory of 2604 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 99 PID 3904 wrote to memory of 2604 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 99 PID 2604 wrote to memory of 4252 2604 cmd.exe 101 PID 2604 wrote to memory of 4252 2604 cmd.exe 101 PID 2604 wrote to memory of 4252 2604 cmd.exe 101 PID 3904 wrote to memory of 5056 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 102 PID 3904 wrote to memory of 5056 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 102 PID 3904 wrote to memory of 5056 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 102 PID 3904 wrote to memory of 1936 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 103 PID 3904 wrote to memory of 1936 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 103 PID 3904 wrote to memory of 1936 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 103 PID 3904 wrote to memory of 1636 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 104 PID 3904 wrote to memory of 1636 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 104 PID 3904 wrote to memory of 1636 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 104 PID 3904 wrote to memory of 3420 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 105 PID 3904 wrote to memory of 3420 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 105 PID 3904 wrote to memory of 3420 3904 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 105 PID 3420 wrote to memory of 976 3420 cmd.exe 110 PID 3420 wrote to memory of 976 3420 cmd.exe 110 PID 3420 wrote to memory of 976 3420 cmd.exe 110 PID 4252 wrote to memory of 2840 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 111 PID 4252 wrote to memory of 2840 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 111 PID 4252 wrote to memory of 2840 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 111 PID 2840 wrote to memory of 2336 2840 cmd.exe 113 PID 2840 wrote to memory of 2336 2840 cmd.exe 113 PID 2840 wrote to memory of 2336 2840 cmd.exe 113 PID 4252 wrote to memory of 2948 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 114 PID 4252 wrote to memory of 2948 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 114 PID 4252 wrote to memory of 2948 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 114 PID 4252 wrote to memory of 3392 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 115 PID 4252 wrote to memory of 3392 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 115 PID 4252 wrote to memory of 3392 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 115 PID 4252 wrote to memory of 4108 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 116 PID 4252 wrote to memory of 4108 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 116 PID 4252 wrote to memory of 4108 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 116 PID 4252 wrote to memory of 2176 4252 2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\aoQQYIYc\NugEMEMo.exe"C:\Users\Admin\aoQQYIYc\NugEMEMo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4884
-
-
C:\ProgramData\DsEUUIAw\BqMAcIQA.exe"C:\ProgramData\DsEUUIAw\BqMAcIQA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"8⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"10⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"12⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"14⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:3876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"16⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"18⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"20⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"22⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"24⤵PID:4540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"26⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"28⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"30⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"32⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock33⤵PID:444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"34⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock35⤵PID:1056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"36⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock37⤵PID:3308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"38⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock39⤵PID:3860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"40⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock41⤵PID:1780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"42⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock43⤵PID:4000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"44⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock45⤵PID:3828
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"46⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock47⤵PID:1672
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"48⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock49⤵PID:5012
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"50⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock51⤵PID:2284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"52⤵PID:2908
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock53⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"54⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock55⤵PID:380
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"56⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock57⤵PID:1096
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"58⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock59⤵PID:2200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"60⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock61⤵PID:3040
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"62⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock63⤵PID:3592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"64⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock65⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"66⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock67⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"68⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock69⤵PID:3820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"70⤵PID:2572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock71⤵PID:924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"72⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock73⤵PID:4988
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"74⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock75⤵PID:4604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"76⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock77⤵PID:3428
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"78⤵PID:2616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock79⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"80⤵PID:3616
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock81⤵PID:1844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"82⤵PID:1604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock83⤵PID:1964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"84⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock85⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"86⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock87⤵PID:212
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"88⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock89⤵PID:3432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"90⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock91⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"92⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock93⤵PID:3932
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"94⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock95⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"96⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock97⤵PID:1296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"98⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock99⤵PID:3180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"100⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock101⤵PID:3332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"102⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock103⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"104⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock105⤵PID:1264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"106⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock107⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"108⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock109⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"110⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock111⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"112⤵PID:4388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock113⤵PID:1956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"114⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock115⤵PID:3820
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"116⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock117⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"118⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock119⤵PID:2784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"120⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock121⤵PID:836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_510df7297b8fc58e61240de0b057a3ec_virlock"122⤵PID:1260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-