Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe
-
Size
112KB
-
MD5
075a7b2ad4f8f6c5b36377ee28d16f89
-
SHA1
29461828281a1f48162d56595a6d2ebfda128634
-
SHA256
3523a6cd753c68872b2eb2beb45f67fb79d2e0f5bcbbe6b5dc78eb7aef82379a
-
SHA512
a74d5f6478325398e482169d9962abc71a6b73ba62d6ad9a525932b9047070228e6ac4eee6a48bb77b409fcf306c528b701f5240beabf3253ff4dc5bfaddde96
-
SSDEEP
3072:R5OIQ43v1T6YhTdKWJlBJHIolzPresrIJU:6IQ4/1T6YhZKEl7rlz/rO
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation EUUAQwEM.exe -
Deletes itself 1 IoCs
pid Process 1488 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 3036 jQkkwgcA.exe 2796 EUUAQwEM.exe -
Loads dropped DLL 20 IoCs
pid Process 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe 3036 jQkkwgcA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EUUAQwEM.exe = "C:\\ProgramData\\sOEcQsUw\\EUUAQwEM.exe" EUUAQwEM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jQkkwgcA.exe = "C:\\Users\\Admin\\CKkwssQw\\jQkkwgcA.exe" 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\EUUAQwEM.exe = "C:\\ProgramData\\sOEcQsUw\\EUUAQwEM.exe" 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\jQkkwgcA.exe = "C:\\Users\\Admin\\CKkwssQw\\jQkkwgcA.exe" jQkkwgcA.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico jQkkwgcA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2336 reg.exe 2744 reg.exe 1780 reg.exe 1712 reg.exe 2584 reg.exe 2672 reg.exe 1500 reg.exe 2740 reg.exe 2248 reg.exe 2696 reg.exe 2988 reg.exe 2620 reg.exe 2164 reg.exe 1316 reg.exe 448 reg.exe 2744 reg.exe 1496 reg.exe 2724 reg.exe 1732 reg.exe 2000 reg.exe 1048 reg.exe 2684 reg.exe 1696 reg.exe 556 reg.exe 2980 reg.exe 1292 reg.exe 2204 reg.exe 2804 reg.exe 2000 reg.exe 2424 reg.exe 2648 reg.exe 2344 reg.exe 2820 reg.exe 2652 reg.exe 1764 reg.exe 2632 reg.exe 1924 reg.exe 2248 reg.exe 1656 reg.exe 2004 reg.exe 2168 reg.exe 944 reg.exe 2860 reg.exe 1552 reg.exe 2568 reg.exe 1644 reg.exe 2864 reg.exe 704 reg.exe 2508 reg.exe 2680 reg.exe 2624 reg.exe 1028 reg.exe 2296 reg.exe 2524 reg.exe 1676 reg.exe 380 reg.exe 992 reg.exe 2472 reg.exe 2836 reg.exe 1940 reg.exe 1940 reg.exe 2904 reg.exe 2772 reg.exe 1312 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2060 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2060 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1216 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1216 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1048 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1048 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 408 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 408 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1732 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1732 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1956 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1956 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2752 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2752 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1592 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1592 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 536 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 536 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1348 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1348 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2056 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2056 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2696 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2696 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2732 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2732 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2752 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2752 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2276 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2276 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2288 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2288 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 836 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 836 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2128 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2128 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2656 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2656 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1872 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1872 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2520 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2520 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1380 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1380 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2568 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2568 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2944 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2944 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2056 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2056 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1388 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1388 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2744 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2744 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1652 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 1652 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 3064 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 3064 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2728 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 2728 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2796 EUUAQwEM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe 2796 EUUAQwEM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 3036 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 28 PID 1948 wrote to memory of 3036 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 28 PID 1948 wrote to memory of 3036 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 28 PID 1948 wrote to memory of 3036 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 28 PID 1948 wrote to memory of 2796 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 29 PID 1948 wrote to memory of 2796 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 29 PID 1948 wrote to memory of 2796 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 29 PID 1948 wrote to memory of 2796 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 29 PID 1948 wrote to memory of 2604 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 30 PID 1948 wrote to memory of 2604 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 30 PID 1948 wrote to memory of 2604 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 30 PID 1948 wrote to memory of 2604 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 30 PID 2604 wrote to memory of 2712 2604 cmd.exe 32 PID 2604 wrote to memory of 2712 2604 cmd.exe 32 PID 2604 wrote to memory of 2712 2604 cmd.exe 32 PID 2604 wrote to memory of 2712 2604 cmd.exe 32 PID 1948 wrote to memory of 2696 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 33 PID 1948 wrote to memory of 2696 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 33 PID 1948 wrote to memory of 2696 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 33 PID 1948 wrote to memory of 2696 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 33 PID 1948 wrote to memory of 2860 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 34 PID 1948 wrote to memory of 2860 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 34 PID 1948 wrote to memory of 2860 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 34 PID 1948 wrote to memory of 2860 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 34 PID 1948 wrote to memory of 2804 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 36 PID 1948 wrote to memory of 2804 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 36 PID 1948 wrote to memory of 2804 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 36 PID 1948 wrote to memory of 2804 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 36 PID 1948 wrote to memory of 2808 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 39 PID 1948 wrote to memory of 2808 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 39 PID 1948 wrote to memory of 2808 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 39 PID 1948 wrote to memory of 2808 1948 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 39 PID 2808 wrote to memory of 2616 2808 cmd.exe 41 PID 2808 wrote to memory of 2616 2808 cmd.exe 41 PID 2808 wrote to memory of 2616 2808 cmd.exe 41 PID 2808 wrote to memory of 2616 2808 cmd.exe 41 PID 2712 wrote to memory of 2936 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 42 PID 2712 wrote to memory of 2936 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 42 PID 2712 wrote to memory of 2936 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 42 PID 2712 wrote to memory of 2936 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 42 PID 2936 wrote to memory of 2060 2936 cmd.exe 44 PID 2936 wrote to memory of 2060 2936 cmd.exe 44 PID 2936 wrote to memory of 2060 2936 cmd.exe 44 PID 2936 wrote to memory of 2060 2936 cmd.exe 44 PID 2712 wrote to memory of 2164 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 45 PID 2712 wrote to memory of 2164 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 45 PID 2712 wrote to memory of 2164 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 45 PID 2712 wrote to memory of 2164 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 45 PID 2712 wrote to memory of 2660 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 46 PID 2712 wrote to memory of 2660 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 46 PID 2712 wrote to memory of 2660 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 46 PID 2712 wrote to memory of 2660 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 46 PID 2712 wrote to memory of 2632 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 48 PID 2712 wrote to memory of 2632 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 48 PID 2712 wrote to memory of 2632 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 48 PID 2712 wrote to memory of 2632 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 48 PID 2712 wrote to memory of 2772 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 50 PID 2712 wrote to memory of 2772 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 50 PID 2712 wrote to memory of 2772 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 50 PID 2712 wrote to memory of 2772 2712 2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe 50 PID 2772 wrote to memory of 2836 2772 cmd.exe 194 PID 2772 wrote to memory of 2836 2772 cmd.exe 194 PID 2772 wrote to memory of 2836 2772 cmd.exe 194 PID 2772 wrote to memory of 2836 2772 cmd.exe 194
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\CKkwssQw\jQkkwgcA.exe"C:\Users\Admin\CKkwssQw\jQkkwgcA.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
PID:3036
-
-
C:\ProgramData\sOEcQsUw\EUUAQwEM.exe"C:\ProgramData\sOEcQsUw\EUUAQwEM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2796
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"6⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"8⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"10⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"12⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"14⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"16⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"18⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"20⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"22⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"24⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"26⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"28⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"30⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"32⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"34⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"36⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"38⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"40⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"42⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"44⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"46⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"48⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"50⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"52⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"54⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"56⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"58⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"60⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"62⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"64⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock65⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"66⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock67⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"68⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock69⤵PID:2804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"70⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock71⤵PID:1136
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"72⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock73⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"74⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock75⤵PID:612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"76⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock77⤵PID:2936
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"78⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock79⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"80⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock81⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"82⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock83⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"84⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock85⤵PID:2884
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"86⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock87⤵PID:1220
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"88⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock89⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"90⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock91⤵PID:2188
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"92⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock93⤵PID:2168
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"94⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock95⤵PID:2536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"96⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock97⤵PID:840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"98⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock99⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"100⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock101⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"102⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock103⤵PID:1492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"104⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock105⤵PID:2396
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"106⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock107⤵PID:1172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"108⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock109⤵PID:1628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"110⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock111⤵PID:924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"112⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock113⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"114⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock115⤵PID:612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"116⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock117⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"118⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock119⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"120⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock121⤵PID:1292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_075a7b2ad4f8f6c5b36377ee28d16f89_virlock"122⤵PID:2752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-