Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
Resource
win10v2004-20240412-en
General
-
Target
2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe
-
Size
235KB
-
MD5
09bf3f42a75392e9189c3c525d2d73b4
-
SHA1
a7b823440b5ac4a29f4e7a879d206a5afe122392
-
SHA256
b0060eb3e956e601273b46efb59ae907457df14bece47eb63399ce361ce80966
-
SHA512
60e0e8e4598f32b70f21633ba6bc9eaeaa11c59b9f5bd024cea4f306c4270d003d0890a0d62e36edf41db99fac7ecb0d0ce21508da7d89f8145d96689180aa13
-
SSDEEP
3072:ZaNQ+911lN+qSVi1gzyD5H+XVgWrjFyNPJLZCeA1q/Oo2Yisga0/Gwj93J0yiUAn:klGqHqe4SAZedMN82Y+a05j932h3VEvE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2096 pwoIEMwo.exe 3032 IqQEgwkY.exe -
Loads dropped DLL 20 IoCs
pid Process 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe 3032 IqQEgwkY.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IqQEgwkY.exe = "C:\\ProgramData\\QgkIMYsQ\\IqQEgwkY.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\IqQEgwkY.exe = "C:\\ProgramData\\QgkIMYsQ\\IqQEgwkY.exe" IqQEgwkY.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwoIEMwo.exe = "C:\\Users\\Admin\\eugYIYsA\\pwoIEMwo.exe" pwoIEMwo.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\EQgkogMY.exe = "C:\\Users\\Admin\\sGcwcskU\\EQgkogMY.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\disgkcAg.exe = "C:\\ProgramData\\WqYAAQYI\\disgkcAg.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\pwoIEMwo.exe = "C:\\Users\\Admin\\eugYIYsA\\pwoIEMwo.exe" 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2816 2192 WerFault.exe 870 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2540 reg.exe 2284 reg.exe 1432 reg.exe 2408 reg.exe 1780 reg.exe 2256 reg.exe 2692 reg.exe 1808 reg.exe 2552 reg.exe 1276 reg.exe 2392 reg.exe 584 reg.exe 1884 reg.exe 804 reg.exe 2032 reg.exe 2668 reg.exe 748 reg.exe 2816 reg.exe 268 reg.exe 1784 reg.exe 1624 reg.exe 1404 reg.exe 1708 reg.exe 2440 reg.exe 1240 reg.exe 1728 reg.exe 2932 reg.exe 380 reg.exe 2792 reg.exe 2588 reg.exe 1680 reg.exe 624 reg.exe 2372 reg.exe 280 reg.exe 1584 reg.exe 2072 reg.exe 1620 reg.exe 320 reg.exe 2564 reg.exe 2504 reg.exe 2980 reg.exe 2500 reg.exe 1636 reg.exe 2984 reg.exe 1132 reg.exe 2320 reg.exe 2900 reg.exe 1356 reg.exe 2700 reg.exe 2712 reg.exe 2072 reg.exe 1524 reg.exe 2188 reg.exe 2460 reg.exe 2368 reg.exe 1524 reg.exe 1440 reg.exe 1640 reg.exe 2572 reg.exe 2720 reg.exe 1348 reg.exe 1524 reg.exe 2848 reg.exe 2028 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2812 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2812 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1496 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1496 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1412 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2304 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2304 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1884 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1884 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2408 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2408 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1608 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1608 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2784 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3016 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3016 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 340 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 340 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2088 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2088 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3000 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 3000 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1476 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1476 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1212 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1212 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2868 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2868 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1568 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1568 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1636 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1636 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1440 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1440 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2812 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2812 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2776 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2204 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2204 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2244 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2244 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2496 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2496 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2692 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2692 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1308 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1308 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2696 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2696 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2780 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2780 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1708 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1708 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1624 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 1624 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2336 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 2336 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2096 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 28 PID 3068 wrote to memory of 2096 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 28 PID 3068 wrote to memory of 2096 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 28 PID 3068 wrote to memory of 2096 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 28 PID 3068 wrote to memory of 3032 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 29 PID 3068 wrote to memory of 3032 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 29 PID 3068 wrote to memory of 3032 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 29 PID 3068 wrote to memory of 3032 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 29 PID 3068 wrote to memory of 2680 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 30 PID 3068 wrote to memory of 2680 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 30 PID 3068 wrote to memory of 2680 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 30 PID 3068 wrote to memory of 2680 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 30 PID 2680 wrote to memory of 2540 2680 cmd.exe 32 PID 2680 wrote to memory of 2540 2680 cmd.exe 32 PID 2680 wrote to memory of 2540 2680 cmd.exe 32 PID 2680 wrote to memory of 2540 2680 cmd.exe 32 PID 3068 wrote to memory of 2712 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 33 PID 3068 wrote to memory of 2712 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 33 PID 3068 wrote to memory of 2712 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 33 PID 3068 wrote to memory of 2712 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 33 PID 3068 wrote to memory of 2692 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 34 PID 3068 wrote to memory of 2692 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 34 PID 3068 wrote to memory of 2692 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 34 PID 3068 wrote to memory of 2692 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 34 PID 3068 wrote to memory of 2440 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 36 PID 3068 wrote to memory of 2440 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 36 PID 3068 wrote to memory of 2440 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 36 PID 3068 wrote to memory of 2440 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 36 PID 3068 wrote to memory of 2520 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 39 PID 3068 wrote to memory of 2520 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 39 PID 3068 wrote to memory of 2520 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 39 PID 3068 wrote to memory of 2520 3068 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 39 PID 2520 wrote to memory of 2456 2520 cmd.exe 41 PID 2520 wrote to memory of 2456 2520 cmd.exe 41 PID 2520 wrote to memory of 2456 2520 cmd.exe 41 PID 2520 wrote to memory of 2456 2520 cmd.exe 41 PID 2540 wrote to memory of 2776 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 42 PID 2540 wrote to memory of 2776 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 42 PID 2540 wrote to memory of 2776 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 42 PID 2540 wrote to memory of 2776 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 42 PID 2776 wrote to memory of 2812 2776 cmd.exe 44 PID 2776 wrote to memory of 2812 2776 cmd.exe 44 PID 2776 wrote to memory of 2812 2776 cmd.exe 44 PID 2776 wrote to memory of 2812 2776 cmd.exe 44 PID 2540 wrote to memory of 2924 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 45 PID 2540 wrote to memory of 2924 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 45 PID 2540 wrote to memory of 2924 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 45 PID 2540 wrote to memory of 2924 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 45 PID 2540 wrote to memory of 356 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 46 PID 2540 wrote to memory of 356 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 46 PID 2540 wrote to memory of 356 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 46 PID 2540 wrote to memory of 356 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 46 PID 2540 wrote to memory of 2668 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 48 PID 2540 wrote to memory of 2668 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 48 PID 2540 wrote to memory of 2668 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 48 PID 2540 wrote to memory of 2668 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 48 PID 2540 wrote to memory of 276 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 51 PID 2540 wrote to memory of 276 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 51 PID 2540 wrote to memory of 276 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 51 PID 2540 wrote to memory of 276 2540 2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe 51 PID 276 wrote to memory of 1356 276 cmd.exe 53 PID 276 wrote to memory of 1356 276 cmd.exe 53 PID 276 wrote to memory of 1356 276 cmd.exe 53 PID 276 wrote to memory of 1356 276 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\eugYIYsA\pwoIEMwo.exe"C:\Users\Admin\eugYIYsA\pwoIEMwo.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2096
-
-
C:\ProgramData\QgkIMYsQ\IqQEgwkY.exe"C:\ProgramData\QgkIMYsQ\IqQEgwkY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"6⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"8⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"10⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"12⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"14⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"16⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"18⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"20⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"22⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:340 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"24⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"26⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"28⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"30⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"32⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"34⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"36⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"38⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"40⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"42⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"44⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"46⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"48⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"50⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"52⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"54⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"56⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"58⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"60⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"62⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"64⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock65⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"66⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock67⤵PID:808
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"68⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock69⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"70⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock71⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"72⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock73⤵PID:1568
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"74⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock75⤵PID:1668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"76⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock77⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"78⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock79⤵PID:1476
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"80⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock81⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"82⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock83⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"84⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock85⤵PID:340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"86⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock87⤵PID:852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"88⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock89⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"90⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock91⤵PID:1440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"92⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock93⤵PID:1540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"94⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock95⤵PID:552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"96⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock97⤵PID:788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"98⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock99⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"100⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock101⤵PID:2464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"102⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock103⤵PID:380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"104⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock105⤵PID:1000
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"106⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock107⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"108⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock109⤵PID:2104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"110⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock111⤵PID:2132
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"112⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock113⤵PID:2920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"114⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock115⤵PID:1044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"116⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock117⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"118⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock119⤵PID:1812
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"120⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock121⤵PID:2240
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-22_09bf3f42a75392e9189c3c525d2d73b4_virlock"122⤵PID:2732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-