Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe
-
Size
121KB
-
MD5
4c7959b55961a3859db47073ccbbbfb6
-
SHA1
c54a1acc69b9df04a6c53c1d930bdd7408bf0018
-
SHA256
3d0c82dfdbc63d66fbcbfbd7c130637473b293d7ff30bcf2b3304f9c19113395
-
SHA512
1301826bdcea85fe4ca2a65a800d159a4842dca29633c659ce65f39e3363a5368160ff665253aba11bc8ac885030d797bc6c40b6f57a5d471cc91689f90d946a
-
SSDEEP
1536:E6pvgqzlgqLub80E8RQhANXdGyUtS5S9Ej46p4NgnkOE1YCeJ1nHaYBxrz+Rm0R8:E5JKKPNXB50PNgkg6YHrsm044EKRJa
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation DGwAkMoM.exe -
Executes dropped EXE 2 IoCs
pid Process 5036 DGwAkMoM.exe 3756 NkMsEAwk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NkMsEAwk.exe = "C:\\ProgramData\\aUckYAss\\NkMsEAwk.exe" 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DGwAkMoM.exe = "C:\\Users\\Admin\\GMsIUEoU\\DGwAkMoM.exe" DGwAkMoM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NkMsEAwk.exe = "C:\\ProgramData\\aUckYAss\\NkMsEAwk.exe" NkMsEAwk.exe Set value (str) \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DGwAkMoM.exe = "C:\\Users\\Admin\\GMsIUEoU\\DGwAkMoM.exe" 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell32.dll.exe DGwAkMoM.exe File created C:\Windows\SysWOW64\shell32.dll.exe DGwAkMoM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 4136 reg.exe 2032 reg.exe 1648 reg.exe 3164 reg.exe 1476 reg.exe 2528 reg.exe 4900 reg.exe 1940 reg.exe 4468 reg.exe 4692 reg.exe 1428 reg.exe 3264 reg.exe 3508 reg.exe 2192 reg.exe 3128 reg.exe 4660 reg.exe 2376 reg.exe 4688 reg.exe 3324 reg.exe 4536 reg.exe 4932 reg.exe 4048 reg.exe 2204 reg.exe 4020 reg.exe 4772 reg.exe 3036 reg.exe 1020 reg.exe 3340 reg.exe 4652 reg.exe 3328 reg.exe 1048 reg.exe 2720 reg.exe 2940 reg.exe 1936 reg.exe 1696 reg.exe 3516 reg.exe 4520 reg.exe 1696 reg.exe 2500 reg.exe 4468 reg.exe 3824 reg.exe 4608 reg.exe 4404 reg.exe 1840 reg.exe 4956 reg.exe 2144 reg.exe 3328 reg.exe 1180 reg.exe 4796 reg.exe 3316 reg.exe 4440 reg.exe 2664 reg.exe 2208 reg.exe 4380 reg.exe 3692 reg.exe 1680 reg.exe 916 reg.exe 1784 reg.exe 1476 reg.exe 944 reg.exe 3344 reg.exe 1052 reg.exe 4064 reg.exe 3516 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2420 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2420 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2420 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2420 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2960 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2960 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2960 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2960 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 540 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 540 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 540 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 540 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3144 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3144 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3144 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3144 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4468 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4468 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4468 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4468 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2936 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2936 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2936 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2936 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2528 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2528 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2528 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2528 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 1172 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 1172 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 1172 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 1172 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2360 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2360 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2360 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 2360 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3280 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3280 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3280 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3280 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3812 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3812 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3812 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3812 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4848 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4848 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4848 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 4848 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3040 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3040 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3040 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 3040 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5036 DGwAkMoM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe 5036 DGwAkMoM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 5036 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 85 PID 3520 wrote to memory of 5036 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 85 PID 3520 wrote to memory of 5036 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 85 PID 3520 wrote to memory of 3756 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 86 PID 3520 wrote to memory of 3756 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 86 PID 3520 wrote to memory of 3756 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 86 PID 3520 wrote to memory of 1424 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 87 PID 3520 wrote to memory of 1424 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 87 PID 3520 wrote to memory of 1424 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 87 PID 1424 wrote to memory of 4060 1424 cmd.exe 89 PID 1424 wrote to memory of 4060 1424 cmd.exe 89 PID 1424 wrote to memory of 4060 1424 cmd.exe 89 PID 3520 wrote to memory of 3652 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 90 PID 3520 wrote to memory of 3652 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 90 PID 3520 wrote to memory of 3652 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 90 PID 3520 wrote to memory of 4236 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 147 PID 3520 wrote to memory of 4236 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 147 PID 3520 wrote to memory of 4236 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 147 PID 3520 wrote to memory of 1364 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 92 PID 3520 wrote to memory of 1364 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 92 PID 3520 wrote to memory of 1364 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 92 PID 3520 wrote to memory of 5024 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 93 PID 3520 wrote to memory of 5024 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 93 PID 3520 wrote to memory of 5024 3520 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 93 PID 5024 wrote to memory of 4468 5024 cmd.exe 161 PID 5024 wrote to memory of 4468 5024 cmd.exe 161 PID 5024 wrote to memory of 4468 5024 cmd.exe 161 PID 4060 wrote to memory of 1440 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 99 PID 4060 wrote to memory of 1440 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 99 PID 4060 wrote to memory of 1440 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 99 PID 1440 wrote to memory of 2752 1440 cmd.exe 170 PID 1440 wrote to memory of 2752 1440 cmd.exe 170 PID 1440 wrote to memory of 2752 1440 cmd.exe 170 PID 4060 wrote to memory of 4064 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 102 PID 4060 wrote to memory of 4064 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 102 PID 4060 wrote to memory of 4064 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 102 PID 4060 wrote to memory of 2036 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 103 PID 4060 wrote to memory of 2036 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 103 PID 4060 wrote to memory of 2036 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 103 PID 4060 wrote to memory of 4056 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 104 PID 4060 wrote to memory of 4056 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 104 PID 4060 wrote to memory of 4056 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 104 PID 4060 wrote to memory of 4244 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 105 PID 4060 wrote to memory of 4244 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 105 PID 4060 wrote to memory of 4244 4060 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 105 PID 4244 wrote to memory of 4240 4244 cmd.exe 110 PID 4244 wrote to memory of 4240 4244 cmd.exe 110 PID 4244 wrote to memory of 4240 4244 cmd.exe 110 PID 2752 wrote to memory of 4260 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 111 PID 2752 wrote to memory of 4260 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 111 PID 2752 wrote to memory of 4260 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 111 PID 4260 wrote to memory of 2420 4260 cmd.exe 113 PID 4260 wrote to memory of 2420 4260 cmd.exe 113 PID 4260 wrote to memory of 2420 4260 cmd.exe 113 PID 2752 wrote to memory of 396 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 114 PID 2752 wrote to memory of 396 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 114 PID 2752 wrote to memory of 396 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 114 PID 2752 wrote to memory of 708 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 115 PID 2752 wrote to memory of 708 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 115 PID 2752 wrote to memory of 708 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 115 PID 2752 wrote to memory of 4184 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 116 PID 2752 wrote to memory of 4184 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 116 PID 2752 wrote to memory of 4184 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 116 PID 2752 wrote to memory of 4556 2752 2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\GMsIUEoU\DGwAkMoM.exe"C:\Users\Admin\GMsIUEoU\DGwAkMoM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:5036
-
-
C:\ProgramData\aUckYAss\NkMsEAwk.exe"C:\ProgramData\aUckYAss\NkMsEAwk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3756
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"10⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"12⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:3144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"14⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"16⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"18⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"20⤵PID:1892
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV121⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"22⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"24⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"26⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"28⤵PID:2092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:3692
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"30⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"32⤵PID:3348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV133⤵PID:3496
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock33⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"34⤵PID:3860
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock35⤵PID:552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"36⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock37⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"38⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock39⤵PID:4796
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"40⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock41⤵PID:4948
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"42⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock43⤵PID:2684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"44⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock45⤵PID:5104
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"46⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock47⤵PID:3624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"48⤵PID:4468
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock49⤵PID:4824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"50⤵PID:2960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV151⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock51⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"52⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock53⤵PID:2032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"54⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock55⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"56⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock57⤵PID:3900
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"58⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock59⤵PID:1072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"60⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock61⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"62⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock63⤵PID:3676
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"64⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock65⤵PID:3708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"66⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock67⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"68⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock69⤵PID:2868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"70⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock71⤵PID:5028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"72⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock73⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"74⤵PID:4380
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV175⤵PID:3124
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock75⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"76⤵PID:4948
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock77⤵PID:460
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"78⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock79⤵PID:1576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"80⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock81⤵PID:3348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"82⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock83⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"84⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock85⤵PID:3132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"86⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock87⤵PID:3868
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"88⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock89⤵PID:2664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"90⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock91⤵PID:1728
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"92⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock93⤵PID:3816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"94⤵PID:960
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV195⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock95⤵PID:1136
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"96⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock97⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"98⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock99⤵PID:5088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"100⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock101⤵PID:860
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"102⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock103⤵PID:3644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"104⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock105⤵PID:2388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"106⤵PID:4944
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock107⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"108⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock109⤵PID:3356
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"110⤵PID:4236
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock111⤵PID:3344
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"112⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock113⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"114⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock115⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"116⤵PID:3988
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock117⤵PID:4680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"118⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock119⤵PID:3716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"120⤵PID:3724
-
C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock121⤵PID:2504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-07-06_4c7959b55961a3859db47073ccbbbfb6_virlock"122⤵PID:3472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-