Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
15/08/2023, 17:58
Static task
static1
Behavioral task
behavioral1
Sample
ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe
-
Size
232KB
-
MD5
ff0f7520359a10c59ae0f8598eb97a31
-
SHA1
057a9457c201239b3908041d6c18dfd02cfc5dfc
-
SHA256
e4f388346b41a3624d36f6bdbd29a342a954618f72731225b8f3c07f9fbc90bf
-
SHA512
b9cfb963d6d17cbef7488f86a37a9f6146dac236d42c32193795c51eaa0456e97aaffede0d807140fd65a14c3d8d73c1cb73ad17728b995e2eb01a5024ad8e37
-
SSDEEP
6144:RKixt59YB5T4XyWMv/1txzW3qgwuU6Dzf:45TVVzzngO6Dj
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cscript.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" cmd.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" conhost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" wmiprvse.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" conhost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1352 BukscMMk.exe 2976 HMkkQEQc.exe -
Loads dropped DLL 20 IoCs
pid Process 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\BukscMMk.exe = "C:\\Users\\Admin\\DAEMAwss\\BukscMMk.exe" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HMkkQEQc.exe = "C:\\ProgramData\\yygwgIgE\\HMkkQEQc.exe" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HMkkQEQc.exe = "C:\\ProgramData\\yygwgIgE\\HMkkQEQc.exe" HMkkQEQc.exe Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\BukscMMk.exe = "C:\\Users\\Admin\\DAEMAwss\\BukscMMk.exe" BukscMMk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 752 reg.exe 2032 reg.exe 1564 reg.exe 1604 reg.exe 1484 reg.exe 2144 reg.exe 1796 reg.exe 1392 reg.exe 696 reg.exe 1084 reg.exe 3048 reg.exe 2748 reg.exe 3060 reg.exe 1996 reg.exe 1472 reg.exe 588 reg.exe 1480 reg.exe 2532 reg.exe 2044 reg.exe 2448 reg.exe 2140 reg.exe 2132 reg.exe 2804 reg.exe 844 reg.exe 2192 reg.exe 2220 reg.exe 768 reg.exe 2228 reg.exe 2556 reg.exe 1396 reg.exe 1860 reg.exe 2568 reg.exe 2184 reg.exe 1124 reg.exe 2108 reg.exe 2624 reg.exe 796 reg.exe 2356 reg.exe 1864 reg.exe 2852 reg.exe 3004 reg.exe 2244 reg.exe 1732 reg.exe 1724 reg.exe 1124 reg.exe 1772 reg.exe 2624 reg.exe 1064 reg.exe 1020 reg.exe 2896 reg.exe 2808 reg.exe 2008 reg.exe 2084 reg.exe 3048 reg.exe 2668 reg.exe 540 reg.exe 1080 reg.exe 1868 reg.exe 2588 reg.exe 2708 reg.exe 1776 reg.exe 936 reg.exe 2952 reg.exe 2384 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1868 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1868 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1664 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1664 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2020 Process not Found 2020 Process not Found 1900 conhost.exe 1900 conhost.exe 2648 reg.exe 2648 reg.exe 2740 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2740 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2060 Process not Found 2060 Process not Found 1868 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1868 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 440 reg.exe 440 reg.exe 1932 cmd.exe 1932 cmd.exe 1860 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1860 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2040 cmd.exe 2040 cmd.exe 3016 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 3016 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2152 cmd.exe 2152 cmd.exe 2112 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2112 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1796 reg.exe 1796 reg.exe 3048 reg.exe 3048 reg.exe 568 conhost.exe 568 conhost.exe 1612 conhost.exe 1612 conhost.exe 1764 cmd.exe 1764 cmd.exe 1480 conhost.exe 1480 conhost.exe 2096 cmd.exe 2096 cmd.exe 2560 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2560 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 2648 conhost.exe 2648 conhost.exe 2908 conhost.exe 2908 conhost.exe 1580 reg.exe 1580 reg.exe 2240 reg.exe 2240 reg.exe 1976 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1976 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 1688 reg.exe 1688 reg.exe 2232 conhost.exe 2232 conhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2976 HMkkQEQc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe 2976 HMkkQEQc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1352 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 28 PID 2536 wrote to memory of 1352 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 28 PID 2536 wrote to memory of 1352 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 28 PID 2536 wrote to memory of 1352 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 28 PID 2536 wrote to memory of 2976 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 29 PID 2536 wrote to memory of 2976 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 29 PID 2536 wrote to memory of 2976 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 29 PID 2536 wrote to memory of 2976 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 29 PID 2536 wrote to memory of 2944 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 30 PID 2536 wrote to memory of 2944 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 30 PID 2536 wrote to memory of 2944 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 30 PID 2536 wrote to memory of 2944 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 30 PID 2944 wrote to memory of 2800 2944 cmd.exe 33 PID 2944 wrote to memory of 2800 2944 cmd.exe 33 PID 2944 wrote to memory of 2800 2944 cmd.exe 33 PID 2944 wrote to memory of 2800 2944 cmd.exe 33 PID 2536 wrote to memory of 2736 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 32 PID 2536 wrote to memory of 2736 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 32 PID 2536 wrote to memory of 2736 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 32 PID 2536 wrote to memory of 2736 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 32 PID 2536 wrote to memory of 2692 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 34 PID 2536 wrote to memory of 2692 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 34 PID 2536 wrote to memory of 2692 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 34 PID 2536 wrote to memory of 2692 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 34 PID 2536 wrote to memory of 2700 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 35 PID 2536 wrote to memory of 2700 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 35 PID 2536 wrote to memory of 2700 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 35 PID 2536 wrote to memory of 2700 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 35 PID 2536 wrote to memory of 2440 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 37 PID 2536 wrote to memory of 2440 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 37 PID 2536 wrote to memory of 2440 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 37 PID 2536 wrote to memory of 2440 2536 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 37 PID 2800 wrote to memory of 1464 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 42 PID 2800 wrote to memory of 1464 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 42 PID 2800 wrote to memory of 1464 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 42 PID 2800 wrote to memory of 1464 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 42 PID 2440 wrote to memory of 1104 2440 cmd.exe 41 PID 2440 wrote to memory of 1104 2440 cmd.exe 41 PID 2440 wrote to memory of 1104 2440 cmd.exe 41 PID 2440 wrote to memory of 1104 2440 cmd.exe 41 PID 1464 wrote to memory of 1868 1464 cmd.exe 44 PID 1464 wrote to memory of 1868 1464 cmd.exe 44 PID 1464 wrote to memory of 1868 1464 cmd.exe 44 PID 1464 wrote to memory of 1868 1464 cmd.exe 44 PID 2800 wrote to memory of 1524 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 46 PID 2800 wrote to memory of 1524 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 46 PID 2800 wrote to memory of 1524 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 46 PID 2800 wrote to memory of 1524 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 46 PID 2800 wrote to memory of 2260 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 45 PID 2800 wrote to memory of 2260 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 45 PID 2800 wrote to memory of 2260 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 45 PID 2800 wrote to memory of 2260 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 45 PID 2800 wrote to memory of 2192 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 47 PID 2800 wrote to memory of 2192 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 47 PID 2800 wrote to memory of 2192 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 47 PID 2800 wrote to memory of 2192 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 47 PID 2800 wrote to memory of 2304 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 48 PID 2800 wrote to memory of 2304 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 48 PID 2800 wrote to memory of 2304 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 48 PID 2800 wrote to memory of 2304 2800 ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe 48 PID 2304 wrote to memory of 1188 2304 cmd.exe 53 PID 2304 wrote to memory of 1188 2304 cmd.exe 53 PID 2304 wrote to memory of 1188 2304 cmd.exe 53 PID 2304 wrote to memory of 1188 2304 cmd.exe 53 -
System policy modification 1 TTPs 32 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cscript.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System cmd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe"C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\DAEMAwss\BukscMMk.exe"C:\Users\Admin\DAEMAwss\BukscMMk.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1352
-
-
C:\ProgramData\yygwgIgE\HMkkQEQc.exe"C:\ProgramData\yygwgIgE\HMkkQEQc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2976
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"4⤵
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"6⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"8⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC9⤵PID:2020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"10⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC11⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"12⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC13⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"14⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"16⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC17⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"18⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"20⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC21⤵PID:440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"22⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC23⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"24⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"26⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC27⤵PID:2040
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"28⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"30⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC31⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"32⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"34⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC35⤵PID:1796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"36⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC37⤵PID:3048
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"38⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC39⤵PID:568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"40⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC41⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"42⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC43⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"44⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC45⤵PID:1480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"46⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC47⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"48⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"50⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC51⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"52⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC53⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"54⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC55⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"56⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC57⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"58⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"60⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC61⤵PID:1688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"62⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC63⤵PID:2232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"64⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC65⤵
- UAC bypass
- System policy modification
PID:2044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"66⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC67⤵PID:1124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"68⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC69⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"70⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC71⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"72⤵
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC73⤵PID:1604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"74⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC75⤵PID:2980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"76⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC77⤵PID:2196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"78⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC79⤵PID:1592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"80⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC81⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC83⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"84⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC85⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"86⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC87⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"88⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC89⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"90⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC91⤵PID:2160
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"92⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC93⤵PID:1884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"94⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC95⤵PID:2676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"96⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC97⤵PID:828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"98⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC99⤵PID:2164
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"100⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC101⤵PID:696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"102⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC103⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"104⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC105⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"106⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC107⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"108⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC109⤵PID:276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"110⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC111⤵PID:1504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"112⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC113⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"114⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC115⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"116⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC117⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"118⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC119⤵PID:1920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"120⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC.exeC:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC121⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\ff0f7520359a10c59ae0f8598eb97a31_virlock_JC"122⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-