Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe
-
Size
118KB
-
MD5
1230ded712fb2a40bb6e4c482d0113eb
-
SHA1
d3f9b992ed9d8789123be9ba75e8427008c6b767
-
SHA256
25472dde6b78b905ada37c271ae7820f19b426c4b017493a3e056bfa5461f3bd
-
SHA512
8e98d1366be67ffb7a47d15d838413afc7590f7ad595b3c6989e2b786ee27706a576658e3ef14821ec2b1c6e0215ca8f7d7504a8d7c1ba730d91655f6222f740
-
SSDEEP
1536:hXn2ah9O12cb5Y/2RYuxv+ch2x+QbZGyJVBDo4NRuLAVA9U67kRE6zI2bIwP11Ca:h32snctp6onh25kofEYkwq0
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 63 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\International\Geo\Nation BoUIYMkA.exe -
Executes dropped EXE 2 IoCs
pid Process 2212 BoUIYMkA.exe 2784 xWccIUUQ.exe -
Loads dropped DLL 20 IoCs
pid Process 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\BoUIYMkA.exe = "C:\\Users\\Admin\\CcsQwYUY\\BoUIYMkA.exe" 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xWccIUUQ.exe = "C:\\ProgramData\\vGkYwAIc\\xWccIUUQ.exe" 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Run\BoUIYMkA.exe = "C:\\Users\\Admin\\CcsQwYUY\\BoUIYMkA.exe" BoUIYMkA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xWccIUUQ.exe = "C:\\ProgramData\\vGkYwAIc\\xWccIUUQ.exe" xWccIUUQ.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico BoUIYMkA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2624 reg.exe 1376 reg.exe 2668 reg.exe 2652 reg.exe 2844 reg.exe 2624 reg.exe 2464 reg.exe 760 reg.exe 2720 reg.exe 2208 reg.exe 1440 reg.exe 1700 reg.exe 888 reg.exe 2768 reg.exe 2768 reg.exe 2012 reg.exe 2996 reg.exe 1696 reg.exe 1360 reg.exe 1644 reg.exe 1764 reg.exe 2948 reg.exe 2200 reg.exe 2464 reg.exe 276 reg.exe 2608 reg.exe 1668 reg.exe 2928 reg.exe 1672 reg.exe 620 reg.exe 1724 reg.exe 2808 reg.exe 1568 reg.exe 1540 reg.exe 320 reg.exe 2640 reg.exe 2160 reg.exe 2836 reg.exe 708 reg.exe 2312 reg.exe 2420 reg.exe 2996 reg.exe 800 reg.exe 2680 reg.exe 1032 reg.exe 2660 reg.exe 2056 reg.exe 2708 reg.exe 2252 reg.exe 2572 reg.exe 1756 reg.exe 2728 reg.exe 1608 reg.exe 1980 reg.exe 2896 reg.exe 1612 reg.exe 2736 reg.exe 596 reg.exe 700 reg.exe 848 reg.exe 484 reg.exe 2136 reg.exe 1496 reg.exe 708 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 304 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 304 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2556 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2556 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1260 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1260 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1196 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1196 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2276 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2276 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2716 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2716 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2680 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2680 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 304 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 304 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 484 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 484 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1776 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1776 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1952 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1952 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2576 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2576 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2768 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2768 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1768 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1768 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1012 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1012 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2112 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2112 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2320 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2320 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2748 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2748 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2184 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2184 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 396 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 396 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1564 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 1564 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 3040 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 3040 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2312 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2312 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2288 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2288 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2452 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2452 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2240 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2240 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 844 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 844 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2556 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2556 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2260 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 2260 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2212 BoUIYMkA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe 2212 BoUIYMkA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2212 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 28 PID 2328 wrote to memory of 2212 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 28 PID 2328 wrote to memory of 2212 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 28 PID 2328 wrote to memory of 2212 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 28 PID 2328 wrote to memory of 2784 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 29 PID 2328 wrote to memory of 2784 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 29 PID 2328 wrote to memory of 2784 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 29 PID 2328 wrote to memory of 2784 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 29 PID 2328 wrote to memory of 2672 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 30 PID 2328 wrote to memory of 2672 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 30 PID 2328 wrote to memory of 2672 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 30 PID 2328 wrote to memory of 2672 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 30 PID 2672 wrote to memory of 2664 2672 cmd.exe 32 PID 2672 wrote to memory of 2664 2672 cmd.exe 32 PID 2672 wrote to memory of 2664 2672 cmd.exe 32 PID 2672 wrote to memory of 2664 2672 cmd.exe 32 PID 2328 wrote to memory of 2660 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 33 PID 2328 wrote to memory of 2660 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 33 PID 2328 wrote to memory of 2660 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 33 PID 2328 wrote to memory of 2660 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 33 PID 2328 wrote to memory of 2600 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 34 PID 2328 wrote to memory of 2600 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 34 PID 2328 wrote to memory of 2600 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 34 PID 2328 wrote to memory of 2600 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 34 PID 2328 wrote to memory of 1536 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 35 PID 2328 wrote to memory of 1536 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 35 PID 2328 wrote to memory of 1536 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 35 PID 2328 wrote to memory of 1536 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 35 PID 2328 wrote to memory of 2808 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 38 PID 2328 wrote to memory of 2808 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 38 PID 2328 wrote to memory of 2808 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 38 PID 2328 wrote to memory of 2808 2328 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 38 PID 2808 wrote to memory of 2480 2808 cmd.exe 41 PID 2808 wrote to memory of 2480 2808 cmd.exe 41 PID 2808 wrote to memory of 2480 2808 cmd.exe 41 PID 2808 wrote to memory of 2480 2808 cmd.exe 41 PID 2664 wrote to memory of 1836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 42 PID 2664 wrote to memory of 1836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 42 PID 2664 wrote to memory of 1836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 42 PID 2664 wrote to memory of 1836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 42 PID 1836 wrote to memory of 304 1836 cmd.exe 44 PID 1836 wrote to memory of 304 1836 cmd.exe 44 PID 1836 wrote to memory of 304 1836 cmd.exe 44 PID 1836 wrote to memory of 304 1836 cmd.exe 44 PID 2664 wrote to memory of 2880 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 45 PID 2664 wrote to memory of 2880 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 45 PID 2664 wrote to memory of 2880 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 45 PID 2664 wrote to memory of 2880 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 45 PID 2664 wrote to memory of 2836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 46 PID 2664 wrote to memory of 2836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 46 PID 2664 wrote to memory of 2836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 46 PID 2664 wrote to memory of 2836 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 46 PID 2664 wrote to memory of 2852 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 48 PID 2664 wrote to memory of 2852 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 48 PID 2664 wrote to memory of 2852 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 48 PID 2664 wrote to memory of 2852 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 48 PID 2664 wrote to memory of 2996 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 49 PID 2664 wrote to memory of 2996 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 49 PID 2664 wrote to memory of 2996 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 49 PID 2664 wrote to memory of 2996 2664 2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe 49 PID 2996 wrote to memory of 1988 2996 cmd.exe 53 PID 2996 wrote to memory of 1988 2996 cmd.exe 53 PID 2996 wrote to memory of 1988 2996 cmd.exe 53 PID 2996 wrote to memory of 1988 2996 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\CcsQwYUY\BoUIYMkA.exe"C:\Users\Admin\CcsQwYUY\BoUIYMkA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2212
-
-
C:\ProgramData\vGkYwAIc\xWccIUUQ.exe"C:\ProgramData\vGkYwAIc\xWccIUUQ.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2784
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"6⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"8⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"10⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"12⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"14⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"16⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"18⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"20⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:484 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"22⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"24⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"26⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"28⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"30⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"32⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"34⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"36⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"38⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"40⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"42⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"44⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"46⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"48⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"50⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"52⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"54⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"56⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"58⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"60⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"62⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"64⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock65⤵PID:2304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"66⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock67⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"68⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock69⤵PID:796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"70⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock71⤵PID:2900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"72⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock73⤵PID:1620
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"74⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock75⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"76⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock77⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"78⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock79⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"80⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock81⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"82⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock83⤵PID:456
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"84⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock85⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"86⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock87⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"88⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock89⤵PID:1108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"90⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock91⤵PID:796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"92⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock93⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"94⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock95⤵PID:1584
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"96⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock97⤵PID:2524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"98⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock99⤵PID:1988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"100⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock101⤵PID:2716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"102⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock103⤵PID:2200
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"104⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock105⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"106⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock107⤵PID:2380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"108⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock109⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"110⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock111⤵PID:3032
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"112⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock113⤵PID:304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"114⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock115⤵PID:2560
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"116⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock117⤵PID:2844
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"118⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock119⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"120⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock121⤵PID:1488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-03-19_1230ded712fb2a40bb6e4c482d0113eb_virlock"122⤵PID:1716
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-