Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2024 10:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe
-
Size
110KB
-
MD5
3cec65c839facd306f6580cd7d6d1766
-
SHA1
540da336459938a2a348870655a7095ad2c77ae6
-
SHA256
90bc5aa4c52ed854ed94fb435b100d72f211543517102ea9020158bb5e02074d
-
SHA512
926fac2d6ac08b797f7282f9e1d9bd5695b0915d648521d13d30c51a59d8e80b124ef43725c4a91161b019294f0ba1b5f22e0a4af83e3f143d3d1970d64cb6f4
-
SSDEEP
3072:Q7wVP8lu4ixBTIHTQ+w3GlcEollp0ez4HmbIssi40Tj:35e94+zk2rotyH0sirTj
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (80) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cQEIUcoI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cQEIUcoI.exe -
Executes dropped EXE 2 IoCs
Processes:
LKkEswIs.execQEIUcoI.exepid process 2356 LKkEswIs.exe 3032 cQEIUcoI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.execQEIUcoI.exeLKkEswIs.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cQEIUcoI.exe = "C:\\ProgramData\\dyUIUwwM\\cQEIUcoI.exe" 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cQEIUcoI.exe = "C:\\ProgramData\\dyUIUwwM\\cQEIUcoI.exe" cQEIUcoI.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LKkEswIs.exe = "C:\\Users\\Admin\\WUUQkYog\\LKkEswIs.exe" LKkEswIs.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YIIQwoEA.exe = "C:\\Users\\Admin\\gscAsIgw\\YIIQwoEA.exe" 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cKwgkwMQ.exe = "C:\\ProgramData\\EWsUkYwc\\cKwgkwMQ.exe" 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LKkEswIs.exe = "C:\\Users\\Admin\\WUUQkYog\\LKkEswIs.exe" 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe -
Drops file in System32 directory 2 IoCs
Processes:
cQEIUcoI.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe cQEIUcoI.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe cQEIUcoI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1084 1720 WerFault.exe YIIQwoEA.exe 5096 932 WerFault.exe cKwgkwMQ.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1492 reg.exe 3316 reg.exe 4060 reg.exe 4900 reg.exe 1528 reg.exe 3420 reg.exe 3504 reg.exe 5048 reg.exe 2864 reg.exe 2716 reg.exe 548 reg.exe 3744 reg.exe 2568 reg.exe 2212 reg.exe 1252 reg.exe 2772 reg.exe 712 reg.exe 2880 reg.exe 4632 reg.exe 4628 reg.exe 4128 reg.exe 2860 reg.exe 1332 reg.exe 3968 reg.exe 4860 reg.exe 5104 reg.exe 3116 reg.exe 3184 reg.exe 1460 reg.exe 3480 reg.exe 116 reg.exe 2044 reg.exe 4696 reg.exe 756 reg.exe 8 reg.exe 572 reg.exe 4568 reg.exe 5088 reg.exe 3380 reg.exe 640 reg.exe 4936 reg.exe 5000 reg.exe 4652 reg.exe 1292 reg.exe 2364 reg.exe 4700 reg.exe 1524 reg.exe 2448 reg.exe 1500 reg.exe 3428 reg.exe 5112 reg.exe 4084 reg.exe 3340 reg.exe 5036 reg.exe 4936 reg.exe 4580 reg.exe 3280 reg.exe 3744 reg.exe 900 reg.exe 3380 reg.exe 4944 reg.exe 2332 reg.exe 3592 reg.exe 2436 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exepid process 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3476 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3476 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3476 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3476 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2228 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2228 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2228 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2228 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1364 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1364 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1364 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1364 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3456 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3456 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3456 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3456 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4012 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4012 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4012 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4012 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3824 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3824 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3824 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3824 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2212 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2212 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2212 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 2212 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 932 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 932 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 932 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 932 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4944 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4944 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4944 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 4944 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3196 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3196 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3196 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 3196 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 380 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 380 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 380 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 380 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe 1492 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
cQEIUcoI.exepid process 3032 cQEIUcoI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
cQEIUcoI.exepid process 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe 3032 cQEIUcoI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.execmd.execmd.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.execmd.execmd.exe2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.execmd.exedescription pid process target process PID 712 wrote to memory of 2356 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe LKkEswIs.exe PID 712 wrote to memory of 2356 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe LKkEswIs.exe PID 712 wrote to memory of 2356 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe LKkEswIs.exe PID 712 wrote to memory of 3032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cQEIUcoI.exe PID 712 wrote to memory of 3032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cQEIUcoI.exe PID 712 wrote to memory of 3032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cQEIUcoI.exe PID 712 wrote to memory of 5096 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 712 wrote to memory of 5096 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 712 wrote to memory of 5096 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 712 wrote to memory of 2992 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 2992 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 2992 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 3236 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 3236 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 3236 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 2308 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 2308 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 2308 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 712 wrote to memory of 5032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 712 wrote to memory of 5032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 712 wrote to memory of 5032 712 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 5096 wrote to memory of 2108 5096 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 5096 wrote to memory of 2108 5096 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 5096 wrote to memory of 2108 5096 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 5032 wrote to memory of 212 5032 cmd.exe cscript.exe PID 5032 wrote to memory of 212 5032 cmd.exe cscript.exe PID 5032 wrote to memory of 212 5032 cmd.exe cscript.exe PID 2108 wrote to memory of 4976 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 2108 wrote to memory of 4976 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 2108 wrote to memory of 4976 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 4976 wrote to memory of 312 4976 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 4976 wrote to memory of 312 4976 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 4976 wrote to memory of 312 4976 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 2108 wrote to memory of 2152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 2152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 2152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 2364 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 2364 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 2364 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 1152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 1152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 1152 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 2108 wrote to memory of 1856 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 2108 wrote to memory of 1856 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 2108 wrote to memory of 1856 2108 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 1856 wrote to memory of 4204 1856 cmd.exe cscript.exe PID 1856 wrote to memory of 4204 1856 cmd.exe cscript.exe PID 1856 wrote to memory of 4204 1856 cmd.exe cscript.exe PID 312 wrote to memory of 1524 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 312 wrote to memory of 1524 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 312 wrote to memory of 1524 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe PID 1524 wrote to memory of 1492 1524 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 1524 wrote to memory of 1492 1524 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 1524 wrote to memory of 1492 1524 cmd.exe 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe PID 312 wrote to memory of 2916 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2916 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2916 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 568 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 568 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 568 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2436 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2436 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2436 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe reg.exe PID 312 wrote to memory of 2924 312 2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\WUUQkYog\LKkEswIs.exe"C:\Users\Admin\WUUQkYog\LKkEswIs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\dyUIUwwM\cQEIUcoI.exe"C:\ProgramData\dyUIUwwM\cQEIUcoI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"8⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"10⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"12⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"14⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"16⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"18⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"20⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"22⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"24⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"26⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"28⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"30⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"32⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock33⤵
- Adds Run key to start application
-
C:\Users\Admin\gscAsIgw\YIIQwoEA.exe"C:\Users\Admin\gscAsIgw\YIIQwoEA.exe"34⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 22435⤵
- Program crash
-
C:\ProgramData\EWsUkYwc\cKwgkwMQ.exe"C:\ProgramData\EWsUkYwc\cKwgkwMQ.exe"34⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 22435⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"34⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock35⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"36⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock37⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"38⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock39⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"40⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock41⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"42⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock43⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"44⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock45⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"46⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock47⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"48⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock49⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"50⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock51⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"52⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock53⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"54⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock55⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"56⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock57⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"58⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock59⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"60⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock61⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"62⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock63⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"64⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock65⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"66⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock67⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"68⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock69⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"70⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock71⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"72⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock73⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"74⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock75⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"76⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock77⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"78⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock79⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"80⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock81⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"82⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock83⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"84⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock85⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"86⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock87⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"88⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock89⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"90⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock91⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"92⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock93⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"94⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock95⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"96⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock97⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"98⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock99⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"100⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock101⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"102⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock103⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"104⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock105⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"106⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock107⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"108⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock109⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"110⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock111⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"112⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock113⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"114⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock115⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"116⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock117⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"118⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock119⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"120⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock121⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"122⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock123⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"124⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock125⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"126⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock127⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"128⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock129⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"130⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock131⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"132⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock133⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"134⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock135⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"136⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock137⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"138⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock139⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"140⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock141⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"142⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock143⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"144⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock145⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"146⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock147⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"148⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock149⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"150⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock151⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"152⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock153⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"154⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock155⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"156⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"158⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1159⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock159⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"160⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1161⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock161⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"162⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1163⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock163⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"164⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock165⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"166⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock167⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"168⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1169⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock169⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"170⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock171⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"172⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock173⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"174⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock175⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"176⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"178⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock179⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"180⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock181⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"182⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock183⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"184⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock185⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"186⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1187⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock187⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"188⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock189⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"190⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock191⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"192⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock193⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock"194⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock195⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1196⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2196⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1197⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f196⤵
- UAC bypass
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1194⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2194⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f194⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\auEMockA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""194⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs195⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1192⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2192⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f192⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OwIYYkgo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""192⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs193⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1190⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2190⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f190⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\KmkEggos.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""190⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1191⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs191⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1188⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2188⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f188⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\biAgsEMw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""188⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs189⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1186⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2186⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f186⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1187⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XUEMogMk.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""186⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs187⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1184⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1185⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2184⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f184⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RuEwMwAA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""184⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1185⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs185⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1182⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2182⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1183⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f182⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MuAgIoUU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""182⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs183⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1180⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2180⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f180⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1181⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kYQMUsEU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""180⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs181⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1178⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f178⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OYscIIEI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""178⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs179⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1176⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2176⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f176⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1177⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eycQYUUg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""176⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs177⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1174⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2174⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f174⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tqYAQUAo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""174⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs175⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1172⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2172⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f172⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HYMcUAwY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""172⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs173⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1170⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2170⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f170⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vocEoAoU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""170⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs171⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1168⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2168⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f168⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SywwkkEs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""168⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs169⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1166⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2166⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f166⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OycoowAM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""166⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs167⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1164⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2164⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f164⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gUsEUYcE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""164⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs165⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1162⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2162⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f162⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pSoIwEEA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""162⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs163⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1160⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2160⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f160⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1161⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NqIgMsIM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""160⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs161⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1158⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1159⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2158⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f158⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zssQYYsw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""158⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs159⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1156⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2156⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f156⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rAAosAMM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""156⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs157⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1154⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2154⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1155⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f154⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IyAkwUoY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""154⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs155⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1152⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2152⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f152⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uIogQQQY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""152⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs153⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1150⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2150⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f150⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eSggQQEY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""150⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1151⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs151⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1148⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f148⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pAIkUYMA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""148⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs149⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1146⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2146⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f146⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1147⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BOgQsooM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""146⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1147⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs147⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1144⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2144⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f144⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nyYUoYYU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""144⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs145⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1142⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2142⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f142⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OKQAwsYU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""142⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs143⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1140⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2140⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f140⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WMAwogMU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""140⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs141⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1138⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2138⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1139⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f138⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wqUoIwIw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""138⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs139⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1136⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2136⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f136⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BuIokQMs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""136⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs137⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1134⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2134⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1135⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f134⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bUsYgwoo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""134⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs135⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1132⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2132⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f132⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nAgAcUYs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""132⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs133⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2130⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f130⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BcIIIQMI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""130⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs131⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2128⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f128⤵
- Modifies registry key
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1129⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SSYcYcsY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""128⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs129⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1126⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2126⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f126⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\qkkEMAMU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""126⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs127⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1124⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2124⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f124⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WowAEkgg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""124⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs125⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1122⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2122⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f122⤵
- UAC bypass
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1123⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hiwokoos.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""122⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs123⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1120⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2120⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f120⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BIkMcMMY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""120⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs121⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1118⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2118⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f118⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hMYYQQgc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""118⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs119⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1116⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2116⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f116⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rKwMYIkY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""116⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs117⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1114⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2114⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f114⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CYoIUccM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""114⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs115⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1112⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2112⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f112⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uAYUAcMs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""112⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs113⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1110⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2110⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f110⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YAsAUoEM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""110⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs111⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1108⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2108⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f108⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZIkgwYAo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""108⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs109⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2106⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f106⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LYcUEEUQ.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""106⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs107⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1104⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2104⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f104⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PgkossUc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""104⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs105⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1102⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2102⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f102⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DOggoIUI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""102⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs103⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1100⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2100⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f100⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\UoUYoYwE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""100⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs101⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 198⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 298⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f98⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\WuEoIcAE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""98⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs99⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 196⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 296⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f96⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CUQsYcsg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""96⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs97⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 194⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 294⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f94⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YoosIAoo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""94⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs95⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 192⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 292⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f92⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NGkQsEMw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""92⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs93⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 190⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 290⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f90⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VaEgkAgI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""90⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs91⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 188⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 288⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f88⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\juwgkMQI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""88⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs89⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 186⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 286⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f86⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zcswoQEA.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""86⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs87⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 184⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 284⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f84⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wekkQwso.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""84⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs85⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 182⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 282⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f82⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\euwEQwcg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""82⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs83⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 180⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 280⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f80⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GsoAYwcc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""80⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs81⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 178⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 278⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f78⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SgsMkMYU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""78⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs79⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 176⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 276⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f76⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DUEYcYQc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""76⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs77⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 174⤵
- Modifies visibility of file extensions in Explorer
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 274⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f74⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RmAwAQQI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""74⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs75⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 172⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 272⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f72⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NQswwEow.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""72⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs73⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 170⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 270⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f70⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XcQskAQs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""70⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs71⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 168⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 268⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f68⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gKIQYsIQ.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""68⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs69⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 166⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 266⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f66⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QKgoEwkU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""66⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs67⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 164⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 264⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f64⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cSwAoIsM.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""64⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs65⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 162⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 262⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f62⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hckEgAks.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""62⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs63⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 160⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 260⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f60⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dIskMUgY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""60⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs61⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 158⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 258⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f58⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zgUksIUQ.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""58⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs59⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 156⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 256⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f56⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tWsUwIMw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""56⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs57⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 154⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 254⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f54⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ymUYgQcw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""54⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs55⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 152⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 252⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f52⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MmIUIUoo.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""52⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs53⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 150⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 250⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f50⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\sUQYokEU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""50⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs51⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 148⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 248⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f48⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wiQEEgYc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""48⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs49⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 146⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 246⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f46⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xQgMAYko.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""46⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs47⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 144⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 244⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f44⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nwAQEEgw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""44⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs45⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 142⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 242⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f42⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JiEQUUgI.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""42⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs43⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 140⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 240⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f40⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nKgkgcsg.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""40⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs41⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 138⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 238⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f38⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mgcEAMUE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""38⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs39⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 136⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 236⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f36⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aAYAMYEE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""36⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs37⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 134⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 234⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f34⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ymIgEowc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""34⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs35⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 132⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 232⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f32⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\yMYEkYAE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""32⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs33⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 130⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 230⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f30⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LUAAYQUw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""30⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs31⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 128⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 228⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f28⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\biowQwoY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""28⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs29⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 126⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 226⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f26⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JkAcUQgY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""26⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs27⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 124⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 224⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f24⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YeAQcYUc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""24⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs25⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 122⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 222⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f22⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EiwUAQEw.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""22⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs23⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 120⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 220⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f20⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ycccgskY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""20⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs21⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 118⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 218⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f18⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\eCYcgowU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""18⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs19⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 116⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 216⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f16⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bAcIYYQc.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""16⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs17⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 114⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 214⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f14⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\dOIEMUks.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""14⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs15⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 112⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 212⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f12⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zIwsMcko.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""12⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs13⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 110⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 210⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f10⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PcgEcsAU.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""10⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs11⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 18⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 28⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f8⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QAoQgMoE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""8⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs9⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 16⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 26⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f6⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uiUwIwgs.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""6⤵
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs7⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 14⤵
- Modifies visibility of file extensions in Explorer
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 24⤵
- Modifies registry key
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f4⤵
- UAC bypass
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QAgAwYsY.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs5⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 12⤵
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 22⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f2⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kMAAUEwE.bat" "C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlock.exe""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp/file.vbs3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1720 -ip 17201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 932 -ip 9321⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Device Stage\Device\{113527a4-45d4-4b6f-b567-97838f1b04b0}\device.png.exeFilesize
153KB
MD5e09dff42f526cdce7427316e897019e6
SHA1c6f6faa5fa55fac3bfff14f3f2215427161fc2bd
SHA256cfdf3c39ac78f62ed32d9a5d9c39eade7ccc9fb56a719d4690169a754db7239c
SHA512239b33a06e08e18fabc49900b321daf1f01167cc0867018cafe1f965054f917278dcf43d8eb8fc75ab4f3c47b2f635c4a8d192453c607699e8679e1134f5a168
-
C:\ProgramData\Package Cache\{33d1fd90-4274-48a1-9bc1-97e33d9c2d6f}\vcredist_x86.exeFilesize
555KB
MD5d3177e5df48185d195406c317a97baf2
SHA154bedca364853d666a648396f5172fa8474e9e9e
SHA256619c5da430e34c8fda6577c6daa0a44fddec27f1260f21e9b184161e3b5c81f2
SHA5120cab26355b59891898198445f636a1cb76430fc83aa2ca17e939f4e7ba12e3a4ca278d27a31602460c512b6d4772d58ef66880a3e884656d535c6a5d13c96196
-
C:\ProgramData\dyUIUwwM\cQEIUcoI.exeFilesize
109KB
MD56913adddfad26f84314ddaa4eac150a8
SHA1514fa64069783307eca31de10d9ff0a55aa771e7
SHA256fc2b908190f4e872384478c6786fdba431c6043675d9786515545ac162e42b6f
SHA512e7ef8ee2e7dd268306cf6528ac9aac620044f861679d1c382474a6c072ffde4a78d2ec82b9d00efd0535bb3cc7957e5fd525d1df422cd985fcc692110635fd58
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\Warning.png.exeFilesize
114KB
MD5e58a9ec71f98b632f6065c0b4451fefe
SHA16519575fc294e841bd16126be0277c4ba64fd8ac
SHA256f1750c632c4840956d04a108bb6e1fca0a351104f73f2d250f35a7e81b1c6782
SHA51223f63457f65b5a3736509f3c5bbe6a5e9d015693ad01977570ccdbd0dd3018438c9b39e8fafa034df8c4812b8fb6a8240655c905f10ca862e72be6abbb2c62e2
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.contrast-black_scale-200.png.exeFilesize
112KB
MD5a24dae4ee21afd1f44e4785e46e6a081
SHA1e6bc42002010e6abc197eed67bcf1fd9d53f065f
SHA25671d11609f012e29166934bc0ac2ea3522662a282506d125e47c74402c0410b0d
SHA512dd12cd810df9c30652d5b9d8d3b8ad7b45fd24f3e1f2062a5786ca577f89a4b4fd1c03dec4c3eb8544dfd374601de281437f1d106c70dbd19ab1c3a175bab73e
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveMedTile.scale-200.png.exeFilesize
113KB
MD5b99242ea45e608721fea66782cd6a6e4
SHA14b51ad3f3aaaf3302c4ce4d5bf842c9e641f2eda
SHA2563f74b0fbdefd7071a1f250b5ef54602e35eb2d8b6640eebc3ab979746ef26b94
SHA512dce913ba51d276b83d724ce20e0609ccd6d008b45dbcbe3f34f882a672e1dd50096c5562511f2517d185a868dffd28818e6d40ecee0e97f62ab86b73b569d293
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\LogoImages\OneDriveSmallTile.contrast-white_scale-150.png.exeFilesize
110KB
MD5558881f8342966730dd676e2fc4f0ab8
SHA12c7c29e3b52e711ef552b19165beb039bedba86b
SHA25642ef0aff3501ad2a4fbfde56ad418aca66cdfec753c9a3e684b64a37f2345db5
SHA512760fdb0825f8d2481373d66ec26841a959bd03eb455d6663fcd4303b9e97770146d2a8fea63b10bc47bca483311b75036ced21089d16eb362233b0864e9b7efb
-
C:\Users\Admin\AppData\Local\Temp\2024-03-28_3cec65c839facd306f6580cd7d6d1766_virlockFilesize
954B
MD5d36af1ec9b66bb61a728702fd39ea0a4
SHA1a0483b7947de6daec4a69864328662b3d70aab86
SHA256f590cbc7c830731b68b55ca1b1ea11818b5afa3566537440a17017296578dae9
SHA5123047a98c784e0d60dcf46635350e983687156fb5168f713dfde0bda9034419cc1a547999c7f8113d9fb3bd672167f06349aef418c3f554617ea7565eb40095f7
-
C:\Users\Admin\AppData\Local\Temp\AEse.exeFilesize
117KB
MD5ec53ad76bdc710dd808ca3c58f786a2f
SHA1a35835f7be0cd5464e7c0eed9560d5333ae8b295
SHA25605585e95a4580ad523504ec18102c2df0ce8bfe2e8ccab1b0d1e3e78a7373b34
SHA51292f58850e377de06d4cdba98529db9a459124de05db35938325be5ae9c82a251ea0fe2679b081aae72c1a5dff4ef587ad7fa688ddf53b74c7902e8263b4599c2
-
C:\Users\Admin\AppData\Local\Temp\AQcs.exeFilesize
745KB
MD5d03e99365d898ee76f6716adfa00b86d
SHA137e5e56bca7bdcc2f619e3aa83677aefbd849c8c
SHA2561ee22025705bb65e26cab16d557fc528eccd63ac8878f4afcc54c5eab06fade5
SHA512d0828e77f2d7ecd84034e47470048cf1cd7c31b9b22fcd14939b771a4cb7cdc9958eef18375c622f8b9de1598df58d76c1e9e8727ca9c0b0217e2f283570a5f6
-
C:\Users\Admin\AppData\Local\Temp\AQsW.exeFilesize
118KB
MD575970134470ae2339bb99ad958a5160e
SHA11a1f224048c62ffee4311ea3bf1fb6cd7fbfe774
SHA25674e51f7db9ac53b4ec6e6658570de77f6e26863fb521fe5bf065c1926db9a7c6
SHA512090427082c1cd91ac8aabf504838d74c90cdc496f2ca8f8f92f8ccad3f6a0031bdbc83b1e601c3cf44cbedfcc54565ecba645e5a8f145aff995a12370d989685
-
C:\Users\Admin\AppData\Local\Temp\AcUU.exeFilesize
707KB
MD5e75ac43250aa4e73c03cfeb3947e008f
SHA1dbe853a3d0accf0d56eb2867b2d4e7a2dbd7f21d
SHA256a5a58cfdde3416e05561944a025398d489b8ce7cdd6c2fdeb837ee9bc89e4e09
SHA512c1fa4d9dd00b578d20ec7b387ac81f2d8ec6fa96cd48b16dae2dc90e590ac75763fa4c8a71a4f8517e8e11cf6bec13edda413a8228977811ec2e3a3cb749cbe7
-
C:\Users\Admin\AppData\Local\Temp\AwEI.exeFilesize
110KB
MD578571446b132548bd87c34871257f22d
SHA10bc4e428cb1ecd5266e66b32441db9000c6550d8
SHA2562e76bd502f9415167ae647ce9363d3242cf3d5fc377e4049f84cb1fd800b2a2d
SHA512fb5596f0797287e9206a3a5fd655f2a6a2758c282d575ad1d33e56afa4b8d80cec4b8f440a2bb49aea75d86b3149f6721193b6d730a7a6acf60f64c2e22f0ad5
-
C:\Users\Admin\AppData\Local\Temp\AwYG.exeFilesize
111KB
MD5af1b86c99d6e2c20ff7c007dfb5b011d
SHA19250738562ab54a9eec35b366917f90eae48aa3a
SHA256084004fec22b2da991f8d1e5f6dbac1855a079e76d7a93b9b6128dc132c777d9
SHA51222b7de29cd6bbb2efc5fbec4a9f3857d38b40121f5efaa07c06361b73ddc6f054bcd2e07ff6cd58bbe081f0c74008d88e51142c7c2cb1edd5cc00646a68f96b7
-
C:\Users\Admin\AppData\Local\Temp\CAEg.exeFilesize
119KB
MD5d1f8f517652a861323c8a5230783c587
SHA11c1aa337a66ac6a4857bc678ef1565e33834cdff
SHA2566ae6a962d2f2661aabcd3828e1d91cb5aba3999d057c9c6ba8ffecaebd3682ab
SHA51287b34418dda465cfde7a700325b8d90931956e4485ab23b149a342711b9701cd3ea84e8033bb48e5d7b84871e4f39cf6045013b60ee55572707fb9f192bca6b2
-
C:\Users\Admin\AppData\Local\Temp\CwMe.exeFilesize
5.2MB
MD5fdb4ef198cfc2426e0e4f5a397d28573
SHA17922097dc21e97145e39ea080fd38ac15a207838
SHA256ec4b8b03057838ed0dfa79635a21ce23851bd0b60d77f0be4195747e8c262059
SHA512181b70fc8fbeed7c838e836dfe612ff571aa7cc7375c167a3cb502b53fa96e4d9073b0e02b84a753423239caf2051ebfed474491cd5cc6c703a9bd64a71eebdc
-
C:\Users\Admin\AppData\Local\Temp\EUoS.exeFilesize
139KB
MD54da34d06ea735f9dc46fe5530929cf63
SHA1f8ab47df96a2af81513cd98856e97ba2ad6afb8d
SHA256406b0f027870d2b6ec1d7a0acd137591e4c639a22d3b8af010ff1e63b0357a1d
SHA5128a9bb94d144edd822f9943f7dd20a4b067d7435d8fbd9e6ccbde58b3d216f2c475b96268d7429588a487e5787f355b32302bf5fcf471febeb4d17560e1f454f1
-
C:\Users\Admin\AppData\Local\Temp\Egoc.exeFilesize
111KB
MD559d5990861b10916f74f79f98bfa4dce
SHA1c5af10bac9bdea9442cfff86e47015f379b70682
SHA256eaf54d1b949d65e3ba0f70815fceb993bd8b59992479d2bad0d12b5e7483078f
SHA512bde79a996fbd76f22b599774d7721248f1ddda320d48e1c330cf2d0aba6f983d75d01cc148c1e55dd9fc13b951d6b75cd2c43c8459943b1a05b85ce9981953b3
-
C:\Users\Admin\AppData\Local\Temp\EkQi.exeFilesize
125KB
MD5b7896aa0d74a5d23d2cfb14e57a0a77e
SHA1827bcc5cee06d446e6de217a3aed6cfc1907619b
SHA256c2b06050fe25123ec4cd55ad086571ae93082fb97f016b6c1e78d20f6a442a53
SHA512d53c13a158ee4329ba9a107cb60a6189796bbc725a26257c340f925b1738876268c6d7b9a3dd3aa7ceedb90f2ee7349f5a2f2ae00a5e7f5f7d97f64201b6da1b
-
C:\Users\Admin\AppData\Local\Temp\EsYo.exeFilesize
112KB
MD573519c589883393440bff2cb2342c03a
SHA15c07d702279036bfe58ee4c8d343b7777d1f7daa
SHA256becfac626b86ae381de661a42dbf89f522275044171bf7eb726a620665160dfe
SHA512f28df6e19b68c70d0ec4d1a45632a4735cd069ae6a8d1eef162cb476de5044f977f1410344822d365aa3c9f360efd11e3313ed15006e367bf320161aa964904e
-
C:\Users\Admin\AppData\Local\Temp\GAcQ.exeFilesize
121KB
MD56d5f00767a43026b6b5f41f74fd1673e
SHA1b102d785c3aba8215cd0ebaefae870042c0f209b
SHA256aca29f66e19b7562d30d52fbca1a5b139bcdefefcf50f109aecefafd2968ca65
SHA51233089691f68875ac234ac12a77c832c0cda1e58f7cd2b69af05e33d388699a7e7857ae6e117855e90d795a627c91ea025038aea76061bc68c0588c9122ced3ad
-
C:\Users\Admin\AppData\Local\Temp\GMwS.exeFilesize
574KB
MD5d15a9a899dbf32946637a0dd23968f8f
SHA13a0918e3733f854e75bcf9732ac47bd25303b128
SHA2568dbd504d8f370844d14e0d3825183e9219bb076445a19509daaa5eab49de360a
SHA5120542a7c834cf31c59c97b86f329396aa377082e99fe7f4a0f589b3e89e5ce9d49d5f5acb5f48f247e368fb24f694f1c4d7fad883a5dadfda85563e8eb7fd750c
-
C:\Users\Admin\AppData\Local\Temp\GoIc.exeFilesize
1.1MB
MD5d00c1366f01243c3f7148edb27c7a841
SHA12016d69e9b6d8224cc926a350167deab5d3be796
SHA256de6030c66cbb4bad7049a72a71cf2a46de51cb20866022d7f91af737483bcacd
SHA512c8ddc33d997cb46385e6c8a89b1c67916db1d61718aade4a3b217e8581e8775b6e36566e8226587ddff22bfde8ebe500baa42be019e4aed69e38c489d48a22f6
-
C:\Users\Admin\AppData\Local\Temp\Gscc.exeFilesize
111KB
MD5575a6e8799dec45551197a6c187676a7
SHA16306af7774c7c88ecfc0db11a76f8eea8247b68f
SHA2562578d8c66c7394266fcef824aaa678ed5175bef0a5de93c70aed4c55b2a2be1b
SHA5122611ff58f7824ddb6fb6b16f4b8fc837d1f2faf1a1d78dc3ef019c12b8d51a95d7f178a95ca7e2e597a366341e1c61a1cf5dd24312fbd115ee31c1a566ca6f8a
-
C:\Users\Admin\AppData\Local\Temp\IIUA.exeFilesize
115KB
MD56b2e161f3dd1ed1f6238de492006be7b
SHA110e58bdb2025c968ed463d67f4c5a39100146842
SHA2560da30ec23e3b1dc4f96bcc42f0b5000bbcfc2daa97578e5dcf23a10138b439de
SHA51246f7961c9f3231caf829127cd1c742194e7644dd860bcca43832995947cf89423f5df790463a78b3be857702ba0a3ef3c94008d52398773288ef3f34d0ec7938
-
C:\Users\Admin\AppData\Local\Temp\IQQw.exeFilesize
555KB
MD5e3d06ae1f856096b3f691656f5710637
SHA15827c564dbd788a399b7c2e287bb32dd9fec96cc
SHA256a08df31c525d81419c941d55f5f9898c3a6dbced820d2b314515389ce1e7e75e
SHA5126971b75e6a6836559d54404b535735262923360297da917cf10a1a9c8f96e243b6972176db1bb20025cfde0823cbecbf1e781fa8db58da86a4ac0da4d97719bb
-
C:\Users\Admin\AppData\Local\Temp\KAgW.exeFilesize
5.8MB
MD51d7f782d5a227bb79f65977b1e74a5b5
SHA102a1d09bf20a5b327b57edb14499e2218e431d07
SHA2566b3010453c4cd2fd3a4860430c7d5fb1bdc56c35007ff7c185d39fbb8bc8a3f7
SHA512dabd13eb69084d13c098df9c3d05e8d8c2cb0eaef08057ff0e4c7bac4cf4833e220667a15d76adbdebee6ac8eae477d6a93bca1134d80a421f2789318da5a6c2
-
C:\Users\Admin\AppData\Local\Temp\KEEG.exeFilesize
110KB
MD50aa654b74f82199208cf0fff361ce202
SHA1329169f1bb98e73d9ac60d1c65222926422faa55
SHA256b75f22d28851a537014773873992deee91b1880ec51004e5b6cda39fc860c66e
SHA512e9135b48352a63b33618839b773494e0fb7637c8fca50a31eef9fe82b1654c6bc56a8f2fa6fd4c95a0031017f0f272b302df153fcc6c54196397d2dff1ec5ba6
-
C:\Users\Admin\AppData\Local\Temp\KIQu.exeFilesize
115KB
MD5d17946d1681f7679eaebd5bf77c28768
SHA1d55200f63ca877dccc03c7cc4c10e4b301834931
SHA2566b0f55dd4fd8dbf0165f756525907703578c520271fd3d707fa42188947318c4
SHA5124206ec08465477f0fbc6392b03c0dad742c61a99b4dd316e8b306eb399ba729b96a040d86aeda36026ab68c9ee4337b2e58909eeee1f42abd39d08ad4d2521d5
-
C:\Users\Admin\AppData\Local\Temp\KUUS.icoFilesize
4KB
MD5ac4b56cc5c5e71c3bb226181418fd891
SHA1e62149df7a7d31a7777cae68822e4d0eaba2199d
SHA256701a17a9ee5c9340bae4f0810f103d1f0ca5c03141e0da826139d5b7397a6fb3
SHA512a8136ef9245c8a03a155d831ed9b9d5b126f160cdf3da3214850305d726d5d511145e0c83b817ca1ac7b10abccb47729624867d48fede0c46da06f4ac50cf998
-
C:\Users\Admin\AppData\Local\Temp\KgMs.exeFilesize
563KB
MD5e7db198ddc91464a249ffec548641d58
SHA144b0ae3c59f7e4c0378ec48bedbe67ddcf0d0102
SHA2562175ad1328f5e079f0098006b85b823ab68036c23d50be29f24707122f67ac67
SHA5128645e25ef0bf1348d81f6e801d1b497e049490b4ac0a62b1a69e55df424fa2672d3b7616570e80b0f543d5d879553999c242d78997d1f34b5895f779e8d20b8b
-
C:\Users\Admin\AppData\Local\Temp\KskS.exeFilesize
122KB
MD522bc43f0a961452baa32c8f084ce167c
SHA1ac48b5adde1cc6fa075411055b88dc714dffbd21
SHA2569b6bbe361d6f3296326fad771b374c56c4a929eed0710001f333cc0ed8e5e2de
SHA512066b3c950aa771317991133ee6a49a1a3b60b5bd096a65d5360d5a8c3eb37677eec20a867c6f7500402cb227ad10e1f46f5122a765bfec851a124e3c0f2eb110
-
C:\Users\Admin\AppData\Local\Temp\Kwsk.exeFilesize
112KB
MD5d8b7d499a020cc4028cf4cda8167be4e
SHA1aac4ab5d353e2465011054068df077bc3e2bf2a4
SHA2566473cf43d1e3c56b9ff1ae3c85492dd5bb5be82a1b4630e6f4537fc9f007505f
SHA512cb33e4a1e7f40c55f71ed62318dc59d7e1a7de60b9f9abf3c643cecb439e952ded62fa63ed32d50c16bc1f40ca09e0a65c3c3507245ece5b23b95d40186d9456
-
C:\Users\Admin\AppData\Local\Temp\MAYG.exeFilesize
117KB
MD5b13a066e48fd0646fc5c8cd14efc7372
SHA1daf60fcdbbd86a8dbb372187a3e1143778a10c68
SHA25628f07be27869c64be13151caf1eeee4ea379df2655def47bf942c4f01253a80b
SHA512d8d7032aa5c59f6aaaf7a5a400bfac1b538e36a6e25f5a0a23bad43745ac35f1f9c9ab2eb0122bcabe713f941b627122fe73357cd3a8a87504ac59bd7723cb69
-
C:\Users\Admin\AppData\Local\Temp\MEkC.exeFilesize
113KB
MD5e81e6b4a63e91d8dde960448783a295f
SHA1b261eb168447cadd6a2aaaf4b138daba2f7b1429
SHA2564789b498a2de78885ca48bc995bb5b23e8c156384e0ca2f73b2e5d4e82d46475
SHA512253a4ea29588827198743033e50f5dd7b4fd07fd41c5ed6ae56496e73acbc349d1a8a57018c207d97bff8d430d94483af69c702949a185ea80c3aec64a9cacd8
-
C:\Users\Admin\AppData\Local\Temp\MYcm.exeFilesize
117KB
MD5ea5237d2061ba53ba5e33854e2d2e681
SHA13598c0c6ec20068f3d2feb7d731ee6349f06f47e
SHA25682dbda87294d5c74de3238e62dea000e35fb5081eaffba4e9fb4d55e8755600a
SHA5121df1bfb6846ef0b489f7cee6453bf25c9b556c8fcc705b2dad6b17ea5716e42f6412e7231237b3251672161bf27de985b07c0cd4a3e057f1584a80c7de39d136
-
C:\Users\Admin\AppData\Local\Temp\Mccq.exeFilesize
348KB
MD5d09040e48a5a055b23b482ffdd38fccd
SHA1123479cece9606ede907328e6d895493d5730a45
SHA2565214fb8002fc5db675b9f8ae84e8eeed89267217458513ce27c09ba815f3502f
SHA5124acb66455c8bd7969403eac2925ac81ffa7f843e06b8cc185d5e192c7f53f2618f35ae2aa18cb7054ac74ab7b6e3be29d243e0f1c3e2a43d4f096380dff92b17
-
C:\Users\Admin\AppData\Local\Temp\MwsE.exeFilesize
111KB
MD51b2f30b03c6bb84a4ddfbed464ff05ba
SHA1fbff272a2fbce9f532bc12ec09d60e7aeb3cd163
SHA2567cc1ae78ac4f2844828345d418c4b49a0f7144d33481d125dbbf81ef8d72ba69
SHA51247797fce0c7eb7d5a2ed7df0f89b31af01813195cdef7d3347f822ac29f2be34221ba7b7741976df99ed1149f13cc9351add19c2e549f6cd9f16a79ae1c101cd
-
C:\Users\Admin\AppData\Local\Temp\MwwG.exeFilesize
572KB
MD5f50ba68dff46ec363d879b4cb115fb89
SHA19275acb41767ee8bead031fb630805198793d53f
SHA2565e7f4d509c1850e8936668018bf6be247985e842ef851ddcaafedf46d246956a
SHA5126a3f02c83e094ed31afa6e341a9dbb1b62d9fa5f53d573bb55779b0c67184fd81975a873edbf9407359b5682e671e83c9f1b38ecdab9e825ebd71f214bce693e
-
C:\Users\Admin\AppData\Local\Temp\OEYC.exeFilesize
764KB
MD5959407370bace37a687cac148bde3918
SHA18329008aff59660fd2126c4b0b73d918370989c0
SHA25689017dcc837168c053e61f16a08a7ddf4a09dd746715b4fcbeead44c348a024e
SHA5120a68ed40a81411c0c47f564a4f1559a98ccff4e8b38a5f0763add71a6cdb425052856a6a3e638b3464a82aa3a01aa75a8a209773b7b9d128904873f419b9b1ca
-
C:\Users\Admin\AppData\Local\Temp\OYgu.exeFilesize
154KB
MD54040c560239132928be850112aab8313
SHA1aaef1157654c502ab3ae91c9d38d82981facae23
SHA2569bdf206020e4eccedcdf4a8b2ce8cd55c127fb3433881276842496f90f4fc4c2
SHA512b173c9471a43968366797ffc446f42454592933b52e5283d5e3f0828ccb35b75d6a77ec32917d2f87a294697e82b0256eb8f0fd0d57d86afd6c3d00f7e4c0e98
-
C:\Users\Admin\AppData\Local\Temp\OcEC.exeFilesize
111KB
MD52dc88e136560648b6c1773fc2dc85a8f
SHA12cc21d886673c0a327d9cf5f2360a12b1e1a3b2c
SHA256ab14da6d8615e4eb7fb855548bdc44ee582cfe322ffe32a44eae4f54c488c49d
SHA5123a9423437b8ed253c5f14b366b7c9dc1d006afa6fea193f18cbc4021c4b5e59f7de67b53f206b16c7f59748c0f21349a907fbe3453bfc725e73b104356935451
-
C:\Users\Admin\AppData\Local\Temp\QUII.exeFilesize
138KB
MD536f78d5cf463ffba16bfad67d5ca3cb0
SHA175c08ae7baa210befe61ffd41e0d9617b2592818
SHA256181d30a7b225fedf75720e835ec71d9f579cb7e224888ba670f455f8b42aee46
SHA5129714cbd560ad6665ac0874669072c10ff76f618cd671a7bc040a3b66d86a7f668c29b353dbb32bd57eee305abdd17054bd666d09e4ebe8f0db86160f4967cba1
-
C:\Users\Admin\AppData\Local\Temp\QkQw.exeFilesize
110KB
MD563bf14aed160c74959510fc5f732bf3b
SHA14e1c60a9bd7b16f462bda7f1dc59722f0d747e05
SHA25647cc247688eadb24e7a98d86b16d23a3d08e0429f883f0f77a0ad26e9a8d99ba
SHA512027d22efeba631a7a421f20ad94b49ca56b11985624ca4169d880a52dc7e4bf48161db97c0823dc64652d948e500360ea6e39be22754ef2c9dc636b11d0028ee
-
C:\Users\Admin\AppData\Local\Temp\QsIO.exeFilesize
112KB
MD59d060493f97ee584dd8d8cbd3b1fff28
SHA16c5406d77ded9892ebf6319fe7ad12bb039ac46c
SHA256ce17056ee03a1dc5a4c266f6fa0841714614713d39baf9c970d7998b061ddf50
SHA5127eaa85470f8fe261456031944fe36078ba02b290184872176874f84068a70ea3ce63de8ab2cf7a1246e53e1c9f15dedcf03a2541c4b4588204082342467893bb
-
C:\Users\Admin\AppData\Local\Temp\SokQ.exeFilesize
110KB
MD56c96080a712aeb8f4585a2435ad7c97c
SHA14a1bb22dd3ecce0d20cacfb17665565e0a6e9c25
SHA256a26fa251a621fadd44fdc07c7de49ee24e57f952fc11e36b18b9b15f6549d41a
SHA51289889f9ef0c5ba23c9bf9fd10c8752511a73bd6deb01f024f1eac3fe1f6296afefc48ccca286a2fa8119aea68452a766643f76b3884889af77433f4d32f92c96
-
C:\Users\Admin\AppData\Local\Temp\UEgc.exeFilesize
112KB
MD52d234abecd5a8ec4779d80bff4ca94d8
SHA1301c35baaf410dbc7e27e991fa455623e1891ca6
SHA256907b71e776946b4480694e614e910f14cedd3c2f317070b3251e8b6a2fef1fd7
SHA5125044e9b64cbc7af56bb65c0e919fa920e276cd658c23f9fd4a6b2e0dfffceb16b5e99bb522eb731456ae255b216aac68deaa80b5c87f6a4a430462b29823f03a
-
C:\Users\Admin\AppData\Local\Temp\UUIS.exeFilesize
113KB
MD5e4db064ff8234c9f183c336242b0b5c6
SHA108192fe941f9cf52630181e77558ba2d5b5ca8ce
SHA2562ab97d02b8eb44d303296feba98df556d53f63557337f342d52438b941944cdd
SHA5122e69d708f2df5d7053c59df3222799a36916598aa43860cf594f193195575006f363cdc1a7ded1708ba5d92778849fc30575040611c0308d939857a122f3b8c3
-
C:\Users\Admin\AppData\Local\Temp\UgIS.icoFilesize
4KB
MD5ee421bd295eb1a0d8c54f8586ccb18fa
SHA1bc06850f3112289fce374241f7e9aff0a70ecb2f
SHA25657e72b9591e318a17feb74efa1262e9222814ad872437094734295700f669563
SHA512dfd36dff3742f39858e4a3e781e756f6d8480caa33b715ad1a8293f6ef436cdc84c3d26428230cdac8651c1ee7947b0e5bb3ac1e32c0b7bbb2bfed81375b5897
-
C:\Users\Admin\AppData\Local\Temp\UsUi.exeFilesize
112KB
MD55cbc86fbd732e430105f732c4a128408
SHA17952d2ff9dd9575d1478c8017224a9129b306495
SHA2562628bdec71bbc107d238330b521d46ebeb92182e2b841b56de195d6ff1b82b61
SHA5128d6e3cf4d91f0a098696cbc469c9a11da9641c887a8984ff5ca705b3ca1722c6ab5e61d7dcebc5cb905070f155715483c61a3be8ae2b875de188b2c194d99184
-
C:\Users\Admin\AppData\Local\Temp\Ussu.exeFilesize
121KB
MD57b9dc53a0a9144615b6b1753c1db0636
SHA122aade951b55ccd533fd17026f17500a001d595f
SHA256f8a9e72e26ff12a5ab9242c7c8e32e91a12807356f4d7aae589858c89502678b
SHA512039d6e2f97d20212983598d94c7d60d08741c2308193fc4d9db8e7d24307b363f61f665f71d1a9a47ef1b99f99b9de298d44e7a151aae45af51d1b60b7b36310
-
C:\Users\Admin\AppData\Local\Temp\Uwko.exeFilesize
1.3MB
MD5c6a6c585fa71f65920553a19561575fd
SHA1c4195f9c49a6bc89b7a4b42784c0cc3fac3be52b
SHA256add76ee79fb136ad52179411033d4109bba073d317e627160286ce33f10a9b63
SHA512fca8581dc6b63b179554d947eeb71dd5bfe94ac3e11a8e61842ef0a9107b977a2af0955833756489afca375eae20e4769bbb9686f26a3d4ccc304cbeff91e1a2
-
C:\Users\Admin\AppData\Local\Temp\WIIC.exeFilesize
111KB
MD5f6c9f416a0d0e8ac2b0a52c368d75807
SHA1cd039715fa44a0ed45aaa2f483749f9da2424feb
SHA256be7d7819df2d9ee06b65ba44b08354625f851176b9b831d34302d3759592a78e
SHA51288d60a9d181aad74258de5ee1b87eaf1c4b7f89077d5828f3f7750f9e31369ef8f067a60aa6770fa54f8f718793e06247de57f3b7ceb86fbf9f40ec36f082509
-
C:\Users\Admin\AppData\Local\Temp\WUQa.exeFilesize
117KB
MD578d385db9a5382ac8db3c5d0f56ffd99
SHA12785d77ad93659dc75dd9c0060e939d24b60391f
SHA256462a254451c9c2e4909e3de3df72d5a3c93c884a46a074997c63ae4fbf2d0ec0
SHA5128e80c39a32edae6c4c20d847b2a2998a92fdbd01e275aadd86ecc169ff637f24920ecfa4d985360841b9e255623b3c23fd9888eef07056080e59fa2cc10466e0
-
C:\Users\Admin\AppData\Local\Temp\WYkM.exeFilesize
110KB
MD5a856d80396e2ccb9004e6a6b4e66b8dd
SHA14ef7ed5a824623b9b123795802950b1202411f76
SHA2562a316771ccfd1b7de94f726d0ac50faf644f62900b2e60f712bce1053920e97d
SHA512101daba27327633cc3c93390872850e4c13b19bf3262d72419b282d81faa985d27e3699966637f2df38a03f675910deeca44de8dd9b53fe2f6299b380ed063b4
-
C:\Users\Admin\AppData\Local\Temp\WgUy.exeFilesize
235KB
MD5fc6d5b6d8bacb2df51fd9e76adf001c4
SHA14778658b39c93c362a9a668edb1ce3b85ebb46e9
SHA2565d6191b7eb27cdeef1488cc1ed9311289557e0cca593167fa0cd24db8a2af009
SHA512ecab9d0ce7d028ed57459b33d1901e5acb3fdf3b4b4c40f5636a5c70c07576a109fe6d3f1c2c00549c4590cfce9a4eea03dfa2951ab3e29fdf499d8e742fec6d
-
C:\Users\Admin\AppData\Local\Temp\YYQK.exeFilesize
113KB
MD53f0d33fdb71486857a990e8698862b52
SHA1516f87e152976ce35d60cb799b52d40b861d66fd
SHA2563cdaf2277ab86956d55187de887ae62c5c79947f3302e346462fd7e6266472ae
SHA512f71c238cae7fbec45c542c298c768990c18fc76fc0417a41b0b86da57d8f5956ca68317e0d61c83eaf9f236b29d844815453449fa5e7f9475f7fd6dea337d835
-
C:\Users\Admin\AppData\Local\Temp\YYcm.exeFilesize
720KB
MD54f4e90549b36732de0f46082b8f667e0
SHA1a711a92f8c396c7bf3f1321dc2be9208ab427e30
SHA256eee7c4cc5d2977fe73f8cb0d70fe11a3de47d4a4e2d2312f9d9d3d8109df44fa
SHA5124fdfb3b8bd90655d95b5fb40b5ec20ab7ad0e8e1929b571bcba697412fc4caad3f3e7b29832cfd957e6f7759860f46b3ca70bdb487010c59e77fb078bb1324c8
-
C:\Users\Admin\AppData\Local\Temp\YYkQ.exeFilesize
117KB
MD5744307fda46012c1121dd361452260c0
SHA1a0381c8ae33f7c976517f0f3516516ff9ca80b1b
SHA256679b4270661e5bb1a1939c5533ff413dd200a6e9bb36086c0e7adc592ec2f5d4
SHA5125b2efab59472c949d2fb2841acd7364d232a1feabb8578abfbf3721eb9e7e9e5e1b34b38b06bf851b7bf7a4f47f5113ee7a60ed3a1302a2894ca842aa1a68399
-
C:\Users\Admin\AppData\Local\Temp\YgUE.exeFilesize
114KB
MD5a9f5790f6aa8df14b126d7688da8758b
SHA17b6ba2d46bedcd35dd45947ca78274412697f3b8
SHA256cc2cb3c6bd638bb4453e152d2f86f35481a5b22b7e1a8a685f9b92e315261cfe
SHA5120dfca6cac6dba35c583cc6b122d6f6df3712a5f8d3a79b64c7c228c669dfba2f24700d55d93b4a9919a0ad97f6d0bb960f882b4c2d5926fff3176377c636ed91
-
C:\Users\Admin\AppData\Local\Temp\YgoU.exeFilesize
110KB
MD586a827970f0bc8b8f856bc6def174b81
SHA1a4650c5646b86d78ae949b3f04ea3762f1daac35
SHA2564f676241614b4bc5d12b775f45cfcd48bd5830ad0a3480f85e9eb473b3343f24
SHA5122727d8ce9f946f982d8e961a56b2a37d420ee3c945486aa711959e51cbaaf48817f51300f485119b697fe1bc3d2bffe6a6c3cffce9f2f4c90ce988c48370e2e7
-
C:\Users\Admin\AppData\Local\Temp\YoAw.exeFilesize
115KB
MD5b5d3f2488884fba070b79fd21927c2f5
SHA16018b3428b1034175080cb43885c68da4a836c57
SHA25690bb6a2b912874c9b06b5774544f47781ce60dda1af27227ad77c490ad9cb9f0
SHA5129835f68eee102c442c8c4736c654dc9458c94925c73a6cd366a6a7ecc674b38f9d2e298be109cc28bbe2a570476d6f0d54c2c3a58eac8320f3601524f1c87af5
-
C:\Users\Admin\AppData\Local\Temp\aEUa.exeFilesize
878KB
MD525eb460445dac1049345894d4a52a3ff
SHA14ee2635636c31389f9f5e90d0041d50a45a9ac7c
SHA2563f18fb12ed78ac793795c27aa6e79eb08ff70ad1f6a70a840a932ff9a113ff59
SHA5124b0d650c0e2a027c7deb95acc6e63be88e51a562958bc56eeee7944b5b005075118f19085337ac85ecb5c020bae55aadbcd30fabf2d091957a92416e1e3e47fb
-
C:\Users\Admin\AppData\Local\Temp\aIAc.exeFilesize
567KB
MD53bd57bd3d475126bb7830c058add8732
SHA1f41917abd359607e8ddbcde3c1af9f8795e04ca8
SHA256ad1789d276bcba2e035c017c756b0c98396fd3fed005fee38badb1232e0fa457
SHA51227429ea59e722650b9c3e0af4c01e22db4b740a869d4b004821662367614229b9e4927173a3ac8e21fc9040a4a98c58432f021d9f75756404b53ef7b1c1dcfa9
-
C:\Users\Admin\AppData\Local\Temp\aoUa.exeFilesize
237KB
MD5d4c2f8700c580b19af26740e9ed5bbdc
SHA14734429460c3ad81c6d77ba37d083ea73a94aa1a
SHA256b3ce75ac78dcba64bd0a3017db22c2771bb6410843d060de9e2d3de9934b12b6
SHA5123c93fc31e6e38b1f005d3befec3cacb75f2a8a1456d0eb7cd2ec135ded35f12f6ef0b1053782567dc03a2555bacb195c2b9924e61744d73d29507362b1f8a32b
-
C:\Users\Admin\AppData\Local\Temp\cEYQ.exeFilesize
112KB
MD57423d9d9ab83f2bbb42f3f6ba6242421
SHA1121384d689b9d7614c52024cc06d8e2e165bf63f
SHA256be334c9697021ec28831e12b814f8175f7905fdf01082a4736278c90dbbf8103
SHA512b1c81f4bf770d5613f5787c324fc8fe6af9a0b52933cfdef9d230e7906dd20a4df3caa8020407eba58d95226b6a88d1e11af2b6bb08780ead00f4e641b99407b
-
C:\Users\Admin\AppData\Local\Temp\cIsW.exeFilesize
112KB
MD559ad0bcf99f66f8d37903cc59bc09bb5
SHA1dba5f4c50650c2e3e181c1ddbc0057a9824846e8
SHA256b2322e10c558961258117c26119d126e3db9f50bc941aecfb75d6b9c94da22f3
SHA51219e00ac54849a92e2bfdedaf7d11e765e0194560fecc85cf9400a80eb7d0c71b63d44c8dbf5af16751b8a8ad139099565ef8ca047a43c724e102e1d97afbd1fb
-
C:\Users\Admin\AppData\Local\Temp\cgQs.exeFilesize
114KB
MD5d88b243c369d1607f6856771305c7b40
SHA12c4036fd27f48b0d37b44b3663b9fcd6653a17a3
SHA2569eff8e19c837d8ee2436ab2d54b0f23980296efbc0af38a38b6c23b688c2b8f4
SHA512965de709227aec34e76441758638317ee3c52134ed847cdbcc2011d2a7c34ffc22c6c1cc5c82ebedebc7110a3b291fa21a7f250eeca468429509cd0ae7d670f9
-
C:\Users\Admin\AppData\Local\Temp\eAsw.exeFilesize
237KB
MD5a33c5a36ab67a3bc8ecc567757f4f1ba
SHA1751570b741e270da4509be641eeea005178cf138
SHA256ed3b2ddf8b10e0487e25939908240e2c99a11f2d4c04662f83a0ff3e1d8d83af
SHA5122cd2db97979e55532b134ec48480227484744607aebfdde27421e5e5f05859289533d8ae04692220527f3d5c1a5f54a94d6f31896a53925c840182d512479f24
-
C:\Users\Admin\AppData\Local\Temp\eIgA.exeFilesize
680KB
MD595b0aaa4b26672262eedcebd19418289
SHA18e69c875e9e7a40dfc56adcfa128accfd49e038f
SHA256dc423f1baf87e0e460d86dc24fbef57519f870872651efd6bbbff28401888190
SHA51211d03e37d5a924e2db83697975dd321feef2dcc5981b91b247c45f86cae45b8eb89c9bbc3c8a847f23a07f7640de60e12f59f24f593783876f14657624880c19
-
C:\Users\Admin\AppData\Local\Temp\egEu.exeFilesize
1.7MB
MD5a90e8b4086d1115b2298ac181b251816
SHA1efbd45b7658ce5f3432064416e544d73d8b58b74
SHA2565a31a1ef37d06625659f87d7619b1e0c41e7ed38ad7659b22048e71986b2ae45
SHA51264e99206acdfcfb73dd0df7cd7ced6d6e031dde2f0ff64d0fe115e94d5cbebcbca9fb945c2f2c99197a474fb55f5b58864e5cc2972b49631c13abb8d6337c4c2
-
C:\Users\Admin\AppData\Local\Temp\file.vbsFilesize
19B
MD54afb5c4527091738faf9cd4addf9d34e
SHA1170ba9d866894c1b109b62649b1893eb90350459
SHA25659d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc
SHA51216d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5
-
C:\Users\Admin\AppData\Local\Temp\gYUi.exeFilesize
486KB
MD5e4da04331c5ac9afab6dfdd4e8292d6a
SHA1cfea2d514477f6e7d3c8ee42a46ca2cf5027b02d
SHA2565a3f04c7721ce454fa3d1efa6a30443d29c5594f06615958ed6aa1ffc5bc4d24
SHA5124fa5d23cf9714d39c3aa55c7b121b3837342fe22dd73f1bcfd60805164141654b6efd96a81ba6562e0805a075c4bf3c6ebec7e83b4adbfb2c758b68a3f0cf774
-
C:\Users\Admin\AppData\Local\Temp\gcEw.exeFilesize
993KB
MD5b927b2818d7e0fb5699c864c2b93dad1
SHA1d9c8b48e912e79796f328d89bf56a7a335f40472
SHA2562687cd171c060962a1346e6ee2ee2313358c8120e41f80141930823d5eb1dfeb
SHA512ec85a2b86b039bcf584b874c7786749660de7dc81e0f167bbfbff7fec0dd44b688ba2881dc47efd5f821d6d8ca67ff934747646053473535c7a4ff630ab75a5d
-
C:\Users\Admin\AppData\Local\Temp\gkUQ.exeFilesize
112KB
MD5accdcb7bf60e269e4f4b6a051e1df5c6
SHA1a89e7a50b33204da8c3d2b1187ae5fa4e358817f
SHA2567512990f24c9eb7a5276f0bccc50dcbcf1d34179f48c29f4055480516b9e9e8d
SHA5122a97b6c6a393b76ad4b257f869610698100377f7a767f5551e09e86f98abd0d405fc845b7d0b45e3f47214777ed2a0d7a7d5a25fd43e57160b784d39908602c1
-
C:\Users\Admin\AppData\Local\Temp\goMw.exeFilesize
112KB
MD56a3a98a50eccdcbb7f64d1a57f7f5f36
SHA1dc85a77dfe2472cd1b7d935c3e271cd9306421ab
SHA256fec4af3b71b452d89994fd5b769cf5f8b4ada8e7940e8ccac43483f3254e3dfd
SHA5128cefa3549b540aaaa3cdbf91745b8564f2c9bc2bc5f109fd4c116c8886cdedd921244dc47a1248476874a6df1b0639292a5d86b59cbb87cb5be9fa5d63b31583
-
C:\Users\Admin\AppData\Local\Temp\iMgo.exeFilesize
114KB
MD518121cb8e0728030effb9fc609464f2f
SHA119a4dc50570ce980c05cfeeb715656c0f907b71f
SHA256862ff34473fbfdcaf5d383e50d389c1bbbc6f608cf1effc3fb43f43831af27a2
SHA512860c170a78462e44a63f9e4fc8ef1729e1a045d74f7f82b8af97e3bc1cffc4921696bb045140189a3250abeb5ee3b751b6e57d16e52153afb3f7aea526a2957b
-
C:\Users\Admin\AppData\Local\Temp\igYa.exeFilesize
112KB
MD592fca85ba7c8a43c07340d879bb3fb15
SHA1a72f1ffd2e93283d06801253762d96aae64e0e87
SHA256ec6e72a6f5ab46728dff5664c388f7aa637ea080e8484cadf19f7528ecd71310
SHA512f2a1cb402c6712848c2408cda062a216fa3a9231a8835246135b07ad60ca290d6991b949bb1406444bf05dad8c2c189347457ab5549406fe0a8f160d7e12c15a
-
C:\Users\Admin\AppData\Local\Temp\ikUy.exeFilesize
115KB
MD561afd08c329b5765663a519ddb8fa2f0
SHA10eb6560268634389f634086a266183180ecdaba0
SHA2560a5b378ffaaaf4640d64ae6770c88e53e5b7c420347ed26d9e3d51d848afdfd7
SHA5129eedcfba384a547db1648b68c3f53e2cd302ed996d9d8237551836dda2203ea23ce8612d360ac984dac4b02d5be7d5fde71fa5d145e26469175fc8f12bb6c272
-
C:\Users\Admin\AppData\Local\Temp\kAIi.exeFilesize
697KB
MD581227e69296b56c9cb868ad4912fbd97
SHA13dccb49c99b73ac6f8a7611eed481f0350f21ded
SHA2568034aff48f59c5e309c50f95939af8beb70a7c5a7da0a3eec5ead8ad74c0f4cd
SHA512bece867185a15c62902bdb7775db26ad0d1715dafacca8b3fc3d9fb1d476f0adeaba1bd778cef9ece172441ae3a4d8353c72782ed5911e9b5ffd139b2cf7a328
-
C:\Users\Admin\AppData\Local\Temp\kMAAUEwE.batFilesize
112B
MD5bae1095f340720d965898063fede1273
SHA1455d8a81818a7e82b1490c949b32fa7ff98d5210
SHA256ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a
SHA5124e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024
-
C:\Users\Admin\AppData\Local\Temp\kQcK.exeFilesize
121KB
MD5b9277e54112eb13606c4b9e3a1ad09f2
SHA1e384aa0d4792ce2f2cb699b35a61160576808c93
SHA2568bc9115023ac3299c0ff68aeaf5c0977980249f334622bdf307d9a32f8033377
SHA512c04082d4b67907caabf6d532fe319cef6a79872da3cdbf001d99ef7386e1a20733dccf9a19f807b48b4435db32a78add96a176ac1309c38be3dffc98c31ab236
-
C:\Users\Admin\AppData\Local\Temp\kgAU.exeFilesize
721KB
MD56dd957a3957616d4c65be4839b4f1473
SHA1bd20677536f90dc58c5fc04de69b5eb7e32a7ea8
SHA2567fee4f5cd8561b01117d4999882aec704b9ffdf440b4b6c881539b093bfa821e
SHA5121fe9ae7ecdacb2783e928554e0be5ffd5cb67321988309b220409fe36dba8c213e31e2cd6995396415eae0c04e41dd6c33fecb314b906111836b511c5180755b
-
C:\Users\Admin\AppData\Local\Temp\kscW.exeFilesize
565KB
MD5e5a79018ea5a3212b65576ae88c208b1
SHA1d73aa4e7fde26efeb8de4607a4a739f87b717cff
SHA256906a12b8fc764c72fbffe84e483c3a06600d5e4d37cc3d55b81e341ee68075ee
SHA51244175b7f74b011645fe34a0242ae6aae63c648e988db72232ac86146fb10c95e9b59a894c1acfc61b5951d8f61f95d0761a2194ed8d600bf296fa7aec6d03e28
-
C:\Users\Admin\AppData\Local\Temp\mIgq.exeFilesize
110KB
MD5eac3733bfb6d20ba5931ffb6235b9096
SHA1a369deda1b911224d47eca6eacb1430d9ddb73dc
SHA25629e22a19973c38b1aaa36c9c541422720fb6da2d050141766fd2fe01028ba3ed
SHA5126b6f84bcb668cb13aefbc1ab15911a9bfc7e04eb0911b49e740fed06a6038b6ed2943745cf6aa2488b974e9f17769e5eb5a8ca781e150752f3f1e3fed6ac7af4
-
C:\Users\Admin\AppData\Local\Temp\mUYY.exeFilesize
110KB
MD55231ca9f61b3a4b6eca6caf2aa87bb80
SHA19615078d35e839e6d621015c6c6272c636972eec
SHA256c42ee5dddc70b5390dabfbbae8290ba4306bc621fa8b9bf9d5a7227d5e1df1ce
SHA512bb5018c8add1cd954c8a332205727407025f127229c07ad5bb41bb121a92614c38211cdad887f6c0d88c0dbf3f31da8468ad19e27a1e84489b2b1fe305fbe579
-
C:\Users\Admin\AppData\Local\Temp\mYoi.exeFilesize
241KB
MD511026ddfa459d06a6ab8bd400bb7a0c5
SHA1918d4b096c8576c3530ad72c5d371cb090993f49
SHA25682ecaa7de0c0e478b2d18d3a2f15f53d62fadb296754573706739d697b1cd140
SHA51237e2bc47c499d1a82cbc20fb7b910adae4308958307839a3bb9e539b49e077d85d42c685a6d3947e79ae007144bf3e34176745ba98fbdab93eddeef7dfade0c5
-
C:\Users\Admin\AppData\Local\Temp\ooEM.exeFilesize
113KB
MD514861fe4467d8582548ac5f3e7a7926d
SHA196189cd7287695a5702646a2f885c1dc7fa1558c
SHA25600fda222d89e5bc05ae2e93802cc23b0c5a2c8b5a7d17f2b81ff2d9cafd783e0
SHA512ff986f726ab8481ee3fcb3ef3bd8cb75a31f5f9aa9bbfe4e3fce786eda58514df3fd178d2ce23f80d8a038416e4e96c07fd8df1aa982383e84726d389f19d5b1
-
C:\Users\Admin\AppData\Local\Temp\oogg.exeFilesize
746KB
MD536cf29c436659637eca2c3b162f7b7e2
SHA1d34dd0a7ab87ee087bef60915056eeb73d5bcd4f
SHA25635b77c2d8fb9edee1b666c22f09594fec424f46cc78f6667ef74dc0536297766
SHA512fe5dcbfe499d579e52a7b1695ba5548c96e336c703b05dcd6ff497a16885798f45248ae72a7885cc16e29ee26e4b18efb753face9783729734b57dc4026ed443
-
C:\Users\Admin\AppData\Local\Temp\osUq.exeFilesize
109KB
MD59d87de59d75b0cd80b951a44d11c14a7
SHA127f38f161367d0eef87248e7bb91ee0d800f8746
SHA2566be321b7bc0c1a647548d8c1f2fa3a4a07af48a48b5c061fe4a0570091e436af
SHA51200a44d8fae36d811fa4709226bfec3ea1cd6757d1e5e7e4449cfc3f704fb0d37eed161431d14873a9f7275b9931b2bdae9c62aec8ca58f66eca9bbde070b8045
-
C:\Users\Admin\AppData\Local\Temp\owgM.exeFilesize
116KB
MD53479e800c14b70d98786ff8b83171522
SHA1818f19ab44b3e054a2eb33e8d89661ec65030aa0
SHA2561680c440d42118ba88fe3682cc33441a7445e87f00b440c61792c4b51fc5dbbd
SHA51277fb91782d458fc4378411bae0d7de44e947ae1b3e7d56a18d3398aefeb0162846735d69f0748f5ab84bf043faf6b769e9541a3735f97e4499d103a4ae044329
-
C:\Users\Admin\AppData\Local\Temp\qAUG.icoFilesize
4KB
MD56edd371bd7a23ec01c6a00d53f8723d1
SHA17b649ce267a19686d2d07a6c3ee2ca852a549ee6
SHA2560b945cd858463198a2319799f721202efb88f1b7273bc3726206f0bb272802f7
SHA51265ccc2a9bdb09cac3293ea8ef68a2e63b30af122d1e4953ee5dc0db7250e56bcca0eb2b78809dbdedef0884fbac51416fc5b9420cb5d02d4d199573e25c1e1f8
-
C:\Users\Admin\AppData\Local\Temp\qAwK.exeFilesize
112KB
MD5816f3dd4bf2b64e5043bb0eaacf32fdf
SHA1306b68bb5c016b8d3b67375aff2025d0fb851b02
SHA256137a8c6d3bacc3fb059cc63b21fd43424909a572b1d6adcdff34335d27d748d8
SHA5129c537da2435d7566891b05ed4d6ca73d2a2b1ac012b9273be0528e6ebf509060808b4610ca68962f8834199a4edd52af8927c023a84dc6ba75f54b24de7d3489
-
C:\Users\Admin\AppData\Local\Temp\qIIa.exeFilesize
110KB
MD5021ffe4aa71f9619cf78702394481b41
SHA13372d4a3c028dcb70ec1d39c5b1c8f7539f8f150
SHA2561775532b1f6813c79d93eb05a2f86dd6fba48615246854f47111f8a439af1dbe
SHA512f235ff6763e915333236aa77e41c2b53aa4a60d4d62e6d55cf1ad9666f7d93199f9b1a15054246a83d1cc464372060e431ac9a5145e6d3fc66f9ac111433bc9f
-
C:\Users\Admin\AppData\Local\Temp\qksU.exeFilesize
1.3MB
MD52ae644bc365c4871b38738d51fc375ea
SHA171bc62259d127b3261dd8857fb16badb975b5f25
SHA2560d085880ab41b710b5b73f8382d8d5605c614c4accb47f82ca7db512c7016b3c
SHA512927ad3a6710efcbe117a015a510a78e2bca2662883c982d795cde4564857ed2c139460193224c25a7f6e49d7873d605b497a83dd2a5c171575ee31f4dd079aad
-
C:\Users\Admin\AppData\Local\Temp\qsQU.exeFilesize
110KB
MD5b8ba54a0885aa3281577b787fd0e907d
SHA1f145228d9314326a71703a7ae4aadc07f1aabaa3
SHA256d5e78c9bd462e284125bd7d58c0bb1a0142721119862e320c7fa1eaf9fb76eba
SHA512c23b0fe40aba17caf18f97df6ab455567dc9c191c64df3468c757b53b3678f619c0aaa5dd48e03f72539498ea64a2bab29140b881f9e3628833b1531bae9b9b9
-
C:\Users\Admin\AppData\Local\Temp\sAwq.exeFilesize
111KB
MD575f86e5ce74b83b174eb1dead9ddb7d2
SHA1d6311c89525595eccb4d0515fbcc8e94d855d332
SHA25617802fe7499714bd1002ef6e96591f615a5a1e7eece8a3d2771ed9234bbcdf86
SHA512ec62c65964e77939a541218ad230fb7959469a0cf44fb16f777658c3cc52c0e44a71e756ae38a2f2683e5b727df41b60b64ef3262c776ac96c8ce2cd998055a4
-
C:\Users\Admin\AppData\Local\Temp\sMAC.exeFilesize
148KB
MD5afaa576fa61e178f8e9ccb6526eb617d
SHA18027a70df7f95e8511c5ec0d9f946dbfa3f0a14b
SHA2562a8786214a0e2feddc8197e1f78672cc42fc4d4d97484fbb881903f368e3c48b
SHA5121f76378219da89658459723ad573710a5ad98d0918c0ae75eac5432286e0641c4d291decc85fa30dadb58ffe03ac354288c092c9c0687147f747908df8466ac9
-
C:\Users\Admin\AppData\Local\Temp\sQoo.exeFilesize
115KB
MD56f849acf0ed04e63a46358e6a821633a
SHA107902899c4889eaf2821bf37e915e5edca89b8f6
SHA25679a3c2b20d3c47299e2943a78eaeee421373b4870a684fdf46db6bdc43a6c220
SHA5122e5ea541cf8fc806365c856dd791901af193865f932c4b6c556f081920f15f3d06bfc3b10ded4a93446e7d1dfbf7c3fe8ccaac5ad0501abc3ad6d41ceeb1d4ad
-
C:\Users\Admin\AppData\Local\Temp\sYEU.exeFilesize
113KB
MD54809a9896b70fe227b0fe41b327af8be
SHA1ac376b8f14ab2533035e8532a7437f71a53dd38c
SHA2560e01847ababf5d4902961b0218ec60c968ff7616b925cfd2ce7e48c2d81866a9
SHA512f92c4156276d8662e5eafa4c64571e8ab329909bd906bff24d7d8e434883a33d4360b63991a413e62af0690dad87820eb8ed81cc1d21b328070f80ea6b705c50
-
C:\Users\Admin\AppData\Local\Temp\sowG.exeFilesize
110KB
MD5178151f8c4aa5bd8abbf0e40d6b44971
SHA1a787c11ea2f8903e4052b9af55a9fba2ef564b96
SHA256468393b1f4f5053a10fd8cad9ba611fd96a18f30240b018cc232030e6bde4833
SHA512dbf9a833c4ab34ea282d3e9b8075e1df902dc19eea1211ae400786abf8b5bac9aa9f51a681f374de55d345cc208afca5b86d7a0a4dd0afc0f8e0122a199aa4d4
-
C:\Users\Admin\AppData\Local\Temp\uAQk.exeFilesize
149KB
MD58c092134b5b94b1240898a39d1940285
SHA1223880d7be5e1bed0783e87f0092bf11e9c7c6a0
SHA256f2def481af2ba2f0b90949ecdd62a1cd106c9ed547cb56948c6220eb73a22b29
SHA51240b0b3120c4db39132998c8377b3d04f4c00869b9a8c73a567b931bb5c91e20115c758910ada273e8ae5f027bc04dbe638cdab1ee20da409b99e270470af803a
-
C:\Users\Admin\AppData\Local\Temp\uMsC.exeFilesize
110KB
MD56af518ac5b337ec5103e8b762cd46b68
SHA10faa24eab9fae5a26d749740c03b3653e50377c9
SHA256da07912fe672cf61a29bc7efdc83557d766309efe4c4074339158e1b2919ec7d
SHA512c10d1f41cb6df6282f076108255fd7372124e30a5efb4fc180513c19be4e39e81b69eee524948114bf967b8e7c6ec2a2a118a1f581d4529d0437cc77f89cc41b
-
C:\Users\Admin\AppData\Local\Temp\uUYO.exeFilesize
648KB
MD507b0fb2adc32012c695e80b9a6aefd36
SHA179d94ce1e778a7ece6a2cec2f65d9f5870782e08
SHA256dd413022f02b99eb75a653892958c568fb768f0063f355d75f6f2753081dc469
SHA5127bee102a0a4b6a780a27546f3c22a2d1f7cb4de38d502f3335871217c02c2bff959ac1f595a87475bdf43d6b050de3ce79cc4d0e390ce9f6d4666953af5b3314
-
C:\Users\Admin\AppData\Local\Temp\uYEK.exeFilesize
112KB
MD56a31e3b5713a08800b4758b9c703fbf4
SHA18a45c8aa9c28ae5ea4d0b2466dae351281da230b
SHA2565bcbec21aaa6afca70408d8a1a8cf812ab3c29bcbd4c953976eb61ba2c40c5a3
SHA512d3409f8f6a85dffdf368f9c8a2a2d2ae59552623665192b3cab8a0bf87c2c9094c976116a769fa994c8ae481582bd94a75374564903bafbc1150912097c18ac5
-
C:\Users\Admin\AppData\Local\Temp\uwUC.exeFilesize
133KB
MD5db7cd771b45055109337c8585f6dad77
SHA12bd1783067987933f7365c102a0e9f35ed43a537
SHA256cde569f3526a7eba45e7576a06c5fc8b425a77912ffa5cbf1a93f104b0d2a6fe
SHA5129297ff217761bd947e6e0c2af2b7e475422015afaf7d094a98d5ac8a982011e791125e8c53dd3d7b6f597cab35dd82488164b5271b4d240c093d7a563333ed5c
-
C:\Users\Admin\AppData\Local\Temp\uwwK.exeFilesize
5.8MB
MD5fb38886301876711c79c046b38d2e9ab
SHA12448510bdb47aef0d5971ced08cebd31bc353689
SHA256489f7f074f74ea146bb3dad2ae8db64ef2d531c5b6d55429bf8415c9c514ccdd
SHA51263cec46bf2e6f9dc2c2ac6ff5e70670b9187e9c56ee0166c034855d9dd6007f2164c5205d55947882f9339a73bb3c2e8fb4f6e6642fb07075d5141c9a8a4666e
-
C:\Users\Admin\AppData\Local\Temp\wAkM.exeFilesize
138KB
MD53a2b6a0b9e185edffd2ba9320bc367b2
SHA1a2df7892607ef2acf7f6c97c58b82fcbc4d6c0c3
SHA256ca21c08ef0961331e186c6ee7ed2cc8cd182a1ced45ae6ffa66002b5b34884aa
SHA512185e9fd2d4eef88da238ac464aaff72bc4faeac6521e7bccc08641ebed933f87239d12a37417824e5be238871e9a80e2af3f5e76bc992b55b90f8a1ed8c7d8ca
-
C:\Users\Admin\AppData\Local\Temp\yIAy.exeFilesize
138KB
MD5a30094eb84ba054c7e0454b19cdb4918
SHA1fe9a8912844e76b82a5898bc30a65f0f0bfb9c90
SHA256871b17c689f67d5452e9cf2ab437dcccd85cfb31312f0a94a4ab74adb8151a9d
SHA51248c8ed42e3270578c19fe117bc63a808b71661e1b55008da2c3e3a3fb31c2bacedf8a8b537ae977078938e935dd245e9a5a7cdd13b1c6ed084505f7b5ef050e1
-
C:\Users\Admin\AppData\Local\Temp\yYci.exeFilesize
698KB
MD53be54bb4b851256a9f51e11737873a2b
SHA1b712884f076445059744fc784c59ae37b5b1b3b2
SHA2565f92c84978e9fa01b2bb948cd16864a34966bc870d2b14f31fa26d14f18cba01
SHA512e376b907fb8440612d31d4e117aed0e85f1d84138bac862558adad90561e49d95e8419607414a75429d5cc3f2c97630757200f92237c72fd5492060ac77c9ec6
-
C:\Users\Admin\AppData\Local\Temp\ysYy.exeFilesize
119KB
MD502832095a2f97d207faa6efcf4d352e3
SHA1c79611925b4ac82eb389c79a9e5b616932011f8b
SHA25698cf4527fc19f8230c45cbf8b9427c462fa3cf83421708a1a3dfbaffa331fa9b
SHA51215bb3ca73e72650073db1a9bacd16c49772d182754489b8b36881e682e15e26f80cba2e6caa702f79a07e36298c1848d2172db925cdc2518258ef0d5c349da61
-
C:\Users\Admin\Pictures\ResizeProtect.png.exeFilesize
863KB
MD52f250db3a62d5c487e0e62a0bf24f393
SHA1eeb6c3a007936d7727203ebb1e66dd63bf25694e
SHA25634c42c59964840a7e1c421cf3ddcded5f5c499e5997d6fab27ccb894b7fd10da
SHA5120900598ab018393d7a85a681e0867d1e60ad3c219867b8b42e92e7900f3bf9b6c119d3651abaec0c6aaadaac815e3b4c7cc20da51fb331eaf0cfb2f02a765bfd
-
C:\Users\Admin\WUUQkYog\LKkEswIs.exeFilesize
110KB
MD529c3cfb7d57507025f70c14068e24561
SHA165b3dd3bbaf988e492ec3396ccf7dadc244c1dcf
SHA256468827733254f83bc3bd00f479259910c3c2bca83d48e08481773eb71df15309
SHA512b5d487863a2b9b4b06ce78949a1928a5282da0df5a3d16f496ba9f17055b3ee8b3946fd56769f8ac993aba12a541bc5a49ee278d6421a206ceed4f545ff41cfc
-
memory/312-27-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/312-43-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/380-183-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/380-172-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/712-0-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/712-19-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/856-297-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/856-284-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/932-148-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/932-201-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1184-251-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1184-239-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1364-89-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1492-39-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1492-184-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1492-55-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1492-196-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1528-293-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1528-306-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1720-219-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1720-200-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/1924-214-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1924-202-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/1964-350-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2108-31-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2212-123-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2212-137-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2228-64-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2228-78-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2356-14-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2728-288-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2728-279-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2916-278-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2916-269-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2916-322-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/2916-332-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3032-15-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/3196-171-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3456-86-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3456-102-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3464-203-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3464-193-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3476-51-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3476-67-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3568-323-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3584-337-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3584-349-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3824-110-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3824-126-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3860-238-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3860-224-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3976-227-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/3976-213-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4008-270-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4012-98-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4012-114-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4036-328-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4036-341-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4892-261-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4892-248-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4944-151-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4944-160-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4992-314-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB
-
memory/4992-303-0x0000000000400000-0x000000000041E000-memory.dmpFilesize
120KB