Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe
Resource
win10v2004-20240704-en
General
-
Target
2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe
-
Size
242KB
-
MD5
faf4a13294c9eb15a32a66ddff1cd0b8
-
SHA1
18dc43f42d13880b13d8459c76a0bedee2b86a54
-
SHA256
958a79dfb26cb0548fa6b48e66b6c826350733a331c77d885ddee2503e2a8ede
-
SHA512
315f709f7c38ca0e723e7fc8ed0e0292f1262e020a682a9b7d01cd7ef3652259d963c94e8293faada8f2e086fe55c79388f41796e1e9d3f3003556401ae45a1c
-
SSDEEP
6144:LjuolgBD6TtaqF73V3b9M5r8YWnWiZ8llW:3uoA6TtaqF7tbm5XWnTZCW
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 61 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Control Panel\International\Geo\Nation xKkwQUQE.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 bkwwowkg.exe 3032 xKkwQUQE.exe -
Loads dropped DLL 20 IoCs
pid Process 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xKkwQUQE.exe = "C:\\ProgramData\\viwMcgAE\\xKkwQUQE.exe" 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkwwowkg.exe = "C:\\Users\\Admin\\CWwAIEEc\\bkwwowkg.exe" bkwwowkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xKkwQUQE.exe = "C:\\ProgramData\\viwMcgAE\\xKkwQUQE.exe" xKkwQUQE.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\bkwwowkg.exe = "C:\\Users\\Admin\\CWwAIEEc\\bkwwowkg.exe" 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2656 reg.exe 1916 reg.exe 2132 reg.exe 1884 reg.exe 824 reg.exe 1244 reg.exe 2524 reg.exe 2616 reg.exe 1696 reg.exe 2592 reg.exe 2176 reg.exe 2552 reg.exe 892 reg.exe 2568 reg.exe 2204 reg.exe 2412 reg.exe 2668 reg.exe 1780 reg.exe 2176 reg.exe 2708 reg.exe 2760 reg.exe 2396 reg.exe 3020 reg.exe 2560 reg.exe 1632 reg.exe 868 reg.exe 3060 reg.exe 1764 reg.exe 2604 reg.exe 2036 reg.exe 1668 reg.exe 2308 reg.exe 624 reg.exe 1616 reg.exe 1932 reg.exe 2492 reg.exe 2956 reg.exe 1804 reg.exe 1044 reg.exe 2776 reg.exe 1788 reg.exe 2512 reg.exe 532 reg.exe 2656 reg.exe 1516 reg.exe 912 reg.exe 1696 reg.exe 2568 reg.exe 2504 reg.exe 2540 reg.exe 2476 reg.exe 2044 reg.exe 1844 reg.exe 1344 reg.exe 3052 reg.exe 1500 reg.exe 1920 reg.exe 2844 reg.exe 2848 reg.exe 668 reg.exe 2364 reg.exe 1864 reg.exe 2172 reg.exe 2040 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3036 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 3036 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 352 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 352 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2960 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2960 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 688 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 688 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2420 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2420 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2796 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2796 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2536 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2536 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1820 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1820 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1052 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1052 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1612 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1612 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1688 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1688 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2116 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2116 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2632 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2632 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1812 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1812 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 692 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 692 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 352 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 352 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1880 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1880 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2204 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2204 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2904 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2904 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1192 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1192 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2220 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2220 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1996 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 1996 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 888 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 888 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2704 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2704 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2572 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2572 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 908 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 908 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2904 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2904 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2208 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2208 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2652 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 2652 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3032 xKkwQUQE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe 3032 xKkwQUQE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2120 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 28 PID 3048 wrote to memory of 2120 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 28 PID 3048 wrote to memory of 2120 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 28 PID 3048 wrote to memory of 2120 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 28 PID 3048 wrote to memory of 3032 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 29 PID 3048 wrote to memory of 3032 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 29 PID 3048 wrote to memory of 3032 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 29 PID 3048 wrote to memory of 3032 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 29 PID 3048 wrote to memory of 2752 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 30 PID 3048 wrote to memory of 2752 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 30 PID 3048 wrote to memory of 2752 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 30 PID 3048 wrote to memory of 2752 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 30 PID 2752 wrote to memory of 2676 2752 cmd.exe 32 PID 2752 wrote to memory of 2676 2752 cmd.exe 32 PID 2752 wrote to memory of 2676 2752 cmd.exe 32 PID 2752 wrote to memory of 2676 2752 cmd.exe 32 PID 3048 wrote to memory of 2800 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 33 PID 3048 wrote to memory of 2800 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 33 PID 3048 wrote to memory of 2800 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 33 PID 3048 wrote to memory of 2800 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 33 PID 3048 wrote to memory of 2812 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 34 PID 3048 wrote to memory of 2812 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 34 PID 3048 wrote to memory of 2812 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 34 PID 3048 wrote to memory of 2812 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 34 PID 3048 wrote to memory of 2708 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 36 PID 3048 wrote to memory of 2708 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 36 PID 3048 wrote to memory of 2708 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 36 PID 3048 wrote to memory of 2708 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 36 PID 3048 wrote to memory of 2852 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 38 PID 3048 wrote to memory of 2852 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 38 PID 3048 wrote to memory of 2852 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 38 PID 3048 wrote to memory of 2852 3048 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 38 PID 2852 wrote to memory of 2524 2852 cmd.exe 41 PID 2852 wrote to memory of 2524 2852 cmd.exe 41 PID 2852 wrote to memory of 2524 2852 cmd.exe 41 PID 2852 wrote to memory of 2524 2852 cmd.exe 41 PID 2676 wrote to memory of 3020 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 42 PID 2676 wrote to memory of 3020 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 42 PID 2676 wrote to memory of 3020 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 42 PID 2676 wrote to memory of 3020 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 42 PID 3020 wrote to memory of 3036 3020 cmd.exe 44 PID 3020 wrote to memory of 3036 3020 cmd.exe 44 PID 3020 wrote to memory of 3036 3020 cmd.exe 44 PID 3020 wrote to memory of 3036 3020 cmd.exe 44 PID 2676 wrote to memory of 2700 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 45 PID 2676 wrote to memory of 2700 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 45 PID 2676 wrote to memory of 2700 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 45 PID 2676 wrote to memory of 2700 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 45 PID 2676 wrote to memory of 2848 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 46 PID 2676 wrote to memory of 2848 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 46 PID 2676 wrote to memory of 2848 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 46 PID 2676 wrote to memory of 2848 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 46 PID 2676 wrote to memory of 2884 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 48 PID 2676 wrote to memory of 2884 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 48 PID 2676 wrote to memory of 2884 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 48 PID 2676 wrote to memory of 2884 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 48 PID 2676 wrote to memory of 2896 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 51 PID 2676 wrote to memory of 2896 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 51 PID 2676 wrote to memory of 2896 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 51 PID 2676 wrote to memory of 2896 2676 2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe 51 PID 2896 wrote to memory of 2004 2896 cmd.exe 53 PID 2896 wrote to memory of 2004 2896 cmd.exe 53 PID 2896 wrote to memory of 2004 2896 cmd.exe 53 PID 2896 wrote to memory of 2004 2896 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\CWwAIEEc\bkwwowkg.exe"C:\Users\Admin\CWwAIEEc\bkwwowkg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2120
-
-
C:\ProgramData\viwMcgAE\xKkwQUQE.exe"C:\ProgramData\viwMcgAE\xKkwQUQE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:3032
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"6⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"8⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"10⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"12⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"14⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"16⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2536 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"18⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"20⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"22⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"24⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"26⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"28⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"30⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"32⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"34⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"36⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"38⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"40⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"42⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"44⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"46⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"48⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"50⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"52⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"54⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"56⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"58⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"60⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"62⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"64⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock65⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"66⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock67⤵PID:2572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"68⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock69⤵PID:2544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"70⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock71⤵PID:2596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"72⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock73⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"74⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock75⤵PID:352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"76⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock77⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"78⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock79⤵PID:784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"80⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock81⤵PID:1636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"82⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock83⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"84⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock85⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"86⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock87⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"88⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock89⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"90⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock91⤵PID:1572
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"92⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock93⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"94⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock95⤵PID:2688
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"96⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock97⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"98⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock99⤵PID:296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"100⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock101⤵PID:540
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"102⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock103⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"104⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock105⤵PID:2172
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"106⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock107⤵PID:2912
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"108⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock109⤵PID:1268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"110⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock111⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"112⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock113⤵PID:2960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"114⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock115⤵PID:784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"116⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock117⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"118⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock119⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock"120⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-07-05_faf4a13294c9eb15a32a66ddff1cd0b8_virlock121⤵PID:1624
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1122⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
PID:532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-