Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe
-
Size
117KB
-
MD5
21c6668b742da8f37daf73c866438c25
-
SHA1
8791036b5376a0e00fbfadf8ff6cbb2f7c890cb3
-
SHA256
4a69753b4a4f7aaedf6398a20ee08d6f31c1f71933ee96aca671bc2711cf0a4c
-
SHA512
3c68be2afbc04c460c4b137fe35ec18c1f75748ac8c261724f6e5996779fb00a5c5565eaaa83fe0e87687aa618b49988f37b7c03299bfce6f7647a28bb70a251
-
SSDEEP
1536:2HBb8I2gqPCwyj6G3XrWcTu1uZsHkxAvn5sCX4l+kZjGW8GWjI+IxgwWeGVuprg:cBYhEOGnrMMGEe/iPlHKGsIlCwgupt1
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 63 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation DWoYEccE.exe -
Executes dropped EXE 2 IoCs
pid Process 1804 hucwIAIw.exe 2256 DWoYEccE.exe -
Loads dropped DLL 20 IoCs
pid Process 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\hucwIAIw.exe = "C:\\Users\\Admin\\PCoMMsYs\\hucwIAIw.exe" 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DWoYEccE.exe = "C:\\ProgramData\\WQQkYEQE\\DWoYEccE.exe" 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\DWoYEccE.exe = "C:\\ProgramData\\WQQkYEQE\\DWoYEccE.exe" DWoYEccE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\hucwIAIw.exe = "C:\\Users\\Admin\\PCoMMsYs\\hucwIAIw.exe" hucwIAIw.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico DWoYEccE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1748 reg.exe 1988 reg.exe 1748 reg.exe 2888 reg.exe 2752 reg.exe 2644 reg.exe 1268 reg.exe 884 reg.exe 1608 reg.exe 1168 reg.exe 1044 reg.exe 1972 reg.exe 2080 reg.exe 1664 reg.exe 1036 reg.exe 852 reg.exe 2656 reg.exe 2652 reg.exe 2796 reg.exe 2652 reg.exe 1140 reg.exe 584 reg.exe 2268 reg.exe 1052 reg.exe 2180 reg.exe 1156 reg.exe 3068 reg.exe 2332 reg.exe 1000 reg.exe 2896 reg.exe 1036 reg.exe 2580 reg.exe 2896 reg.exe 2856 reg.exe 872 reg.exe 2628 reg.exe 2328 reg.exe 1788 reg.exe 2476 reg.exe 576 reg.exe 2424 reg.exe 2876 reg.exe 928 reg.exe 2068 reg.exe 1400 reg.exe 708 reg.exe 1448 reg.exe 2416 reg.exe 2080 reg.exe 2748 reg.exe 2152 reg.exe 2688 reg.exe 2084 reg.exe 3016 reg.exe 608 reg.exe 2468 reg.exe 1264 reg.exe 888 reg.exe 2820 reg.exe 2712 reg.exe 2492 reg.exe 1780 reg.exe 1564 reg.exe 2460 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1688 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1688 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 832 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 832 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1228 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1228 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1036 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1036 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1296 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1296 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2468 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2468 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2996 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2996 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1448 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1448 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 336 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 336 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1156 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1156 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 892 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 892 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1796 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1796 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2628 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2628 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2168 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2168 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2060 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2060 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 336 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 336 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 572 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 572 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2284 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2284 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2524 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2524 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1896 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1896 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2268 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2268 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2604 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2604 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2316 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2316 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2564 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2564 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2960 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2960 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2612 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2612 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2236 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2236 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1448 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1448 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2208 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 2208 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 1636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2256 DWoYEccE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe 2256 DWoYEccE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 1804 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 28 PID 2760 wrote to memory of 1804 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 28 PID 2760 wrote to memory of 1804 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 28 PID 2760 wrote to memory of 1804 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 28 PID 2760 wrote to memory of 2256 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 29 PID 2760 wrote to memory of 2256 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 29 PID 2760 wrote to memory of 2256 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 29 PID 2760 wrote to memory of 2256 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 29 PID 2760 wrote to memory of 2648 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 30 PID 2760 wrote to memory of 2648 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 30 PID 2760 wrote to memory of 2648 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 30 PID 2760 wrote to memory of 2648 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 30 PID 2648 wrote to memory of 2636 2648 cmd.exe 32 PID 2648 wrote to memory of 2636 2648 cmd.exe 32 PID 2648 wrote to memory of 2636 2648 cmd.exe 32 PID 2648 wrote to memory of 2636 2648 cmd.exe 32 PID 2760 wrote to memory of 2888 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 33 PID 2760 wrote to memory of 2888 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 33 PID 2760 wrote to memory of 2888 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 33 PID 2760 wrote to memory of 2888 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 33 PID 2760 wrote to memory of 2448 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 34 PID 2760 wrote to memory of 2448 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 34 PID 2760 wrote to memory of 2448 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 34 PID 2760 wrote to memory of 2448 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 34 PID 2760 wrote to memory of 2884 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 36 PID 2760 wrote to memory of 2884 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 36 PID 2760 wrote to memory of 2884 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 36 PID 2760 wrote to memory of 2884 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 36 PID 2760 wrote to memory of 2480 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 39 PID 2760 wrote to memory of 2480 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 39 PID 2760 wrote to memory of 2480 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 39 PID 2760 wrote to memory of 2480 2760 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 39 PID 2480 wrote to memory of 2552 2480 cmd.exe 41 PID 2480 wrote to memory of 2552 2480 cmd.exe 41 PID 2480 wrote to memory of 2552 2480 cmd.exe 41 PID 2480 wrote to memory of 2552 2480 cmd.exe 41 PID 2636 wrote to memory of 2992 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 42 PID 2636 wrote to memory of 2992 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 42 PID 2636 wrote to memory of 2992 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 42 PID 2636 wrote to memory of 2992 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 42 PID 2992 wrote to memory of 1688 2992 cmd.exe 44 PID 2992 wrote to memory of 1688 2992 cmd.exe 44 PID 2992 wrote to memory of 1688 2992 cmd.exe 44 PID 2992 wrote to memory of 1688 2992 cmd.exe 44 PID 2636 wrote to memory of 2856 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 45 PID 2636 wrote to memory of 2856 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 45 PID 2636 wrote to memory of 2856 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 45 PID 2636 wrote to memory of 2856 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 45 PID 2636 wrote to memory of 2628 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 46 PID 2636 wrote to memory of 2628 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 46 PID 2636 wrote to memory of 2628 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 46 PID 2636 wrote to memory of 2628 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 46 PID 2636 wrote to memory of 2820 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 48 PID 2636 wrote to memory of 2820 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 48 PID 2636 wrote to memory of 2820 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 48 PID 2636 wrote to memory of 2820 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 48 PID 2636 wrote to memory of 1636 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 51 PID 2636 wrote to memory of 1636 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 51 PID 2636 wrote to memory of 1636 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 51 PID 2636 wrote to memory of 1636 2636 2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe 51 PID 1636 wrote to memory of 1788 1636 cmd.exe 325 PID 1636 wrote to memory of 1788 1636 cmd.exe 325 PID 1636 wrote to memory of 1788 1636 cmd.exe 325 PID 1636 wrote to memory of 1788 1636 cmd.exe 325
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\PCoMMsYs\hucwIAIw.exe"C:\Users\Admin\PCoMMsYs\hucwIAIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1804
-
-
C:\ProgramData\WQQkYEQE\DWoYEccE.exe"C:\ProgramData\WQQkYEQE\DWoYEccE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2256
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"6⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"8⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"10⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"12⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"14⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"16⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"18⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"20⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"22⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"24⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"26⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"28⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"30⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"32⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"34⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"36⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"38⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"40⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"42⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"44⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"46⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"48⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"50⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"52⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"54⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"56⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"58⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"60⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"62⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"64⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock65⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"66⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock67⤵PID:2088
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"68⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock69⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"70⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock71⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"72⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock73⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"74⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock75⤵PID:1168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"76⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock77⤵PID:1828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"78⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock79⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"80⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock81⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"82⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock83⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"84⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock85⤵PID:1956
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"86⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock87⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"88⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock89⤵PID:2996
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"90⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock91⤵PID:3000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"92⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock93⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"94⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock95⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"96⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock97⤵PID:2024
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"98⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock99⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"100⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock101⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"102⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock103⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"104⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock105⤵PID:1244
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"106⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock107⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock109⤵PID:2448
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"110⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock111⤵PID:1264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"112⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock113⤵PID:2268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"114⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock115⤵PID:2412
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"116⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock117⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"118⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock119⤵PID:1308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"120⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock121⤵PID:600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-07_21c6668b742da8f37daf73c866438c25_virlock"122⤵PID:1784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-