Analysis
-
max time kernel
180s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 22:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe
-
Size
165KB
-
MD5
401dbbf4b8f35ef9f4b5fdc9ffc5ffe0
-
SHA1
0a777fe216b7e5489e1955274510465b1a2a911a
-
SHA256
bad6a5b82befc8bb82bf7010221f9a1f047dff4c44c46113f6a7cb4fd969b094
-
SHA512
40a663debb5642b38fc7b2a6ef560842c455410441bbe9f02dd8ca38b28604fbb41cdb15252bd7194c4e598df85d37a135c7dae4c315f6c71767c84fb9190e9c
-
SSDEEP
3072:jRDc4/N092Bi8NhWIBCoO4gN5qq4eN7d/wXfa/FI1ey0j1C:NDTbBi8NsIBCoOhblN7dJivL
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Control Panel\International\Geo\Nation JOEIcwgU.exe Key value queried \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Control Panel\International\Geo\Nation imsQUAII.exe -
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2432 JOEIcwgU.exe 2504 imsQUAII.exe -
Loads dropped DLL 20 IoCs
pid Process 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\JOEIcwgU.exe = "C:\\Users\\Admin\\rsUIkksI\\JOEIcwgU.exe" 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\imsQUAII.exe = "C:\\ProgramData\\pqAoUsYQ\\imsQUAII.exe" 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\JOEIcwgU.exe = "C:\\Users\\Admin\\rsUIkksI\\JOEIcwgU.exe" JOEIcwgU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\imsQUAII.exe = "C:\\ProgramData\\pqAoUsYQ\\imsQUAII.exe" imsQUAII.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 864 reg.exe 1468 reg.exe 1476 reg.exe 2864 reg.exe 1676 reg.exe 1960 reg.exe 1572 reg.exe 2108 reg.exe 740 reg.exe 2068 reg.exe 2496 reg.exe 1944 reg.exe 936 reg.exe 1884 reg.exe 320 reg.exe 1932 reg.exe 444 reg.exe 1876 reg.exe 2756 reg.exe 1264 reg.exe 2288 reg.exe 2420 reg.exe 1128 reg.exe 2476 reg.exe 2260 reg.exe 2980 reg.exe 1960 reg.exe 2572 reg.exe 2056 reg.exe 1476 reg.exe 1888 reg.exe 2860 reg.exe 2824 reg.exe 1680 reg.exe 2500 reg.exe 2164 reg.exe 2324 reg.exe 3056 reg.exe 2928 reg.exe 1384 reg.exe 1776 reg.exe 2860 reg.exe 1660 reg.exe 2676 reg.exe 1752 reg.exe 1516 reg.exe 1508 reg.exe 560 reg.exe 2204 reg.exe 3044 reg.exe 1984 reg.exe 1068 reg.exe 2096 reg.exe 1072 reg.exe 2372 reg.exe 920 reg.exe 2120 reg.exe 1676 reg.exe 1968 reg.exe 1724 reg.exe 2064 reg.exe 2172 reg.exe 1704 reg.exe 1104 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1000 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1000 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2972 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2972 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1884 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1884 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2968 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2968 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2708 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2708 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2492 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2492 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 864 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 864 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1468 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1468 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1328 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1328 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2140 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2140 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2704 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2704 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2856 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2856 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2956 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2956 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 792 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 792 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2772 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2772 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2372 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2372 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2924 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2924 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1452 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1452 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2980 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2980 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1532 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1532 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1348 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1348 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2372 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2372 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1176 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1176 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1640 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1640 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1816 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1816 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1540 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1540 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2928 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 2928 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1068 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 1068 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 748 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 748 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2432 JOEIcwgU.exe 2504 imsQUAII.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe 2432 JOEIcwgU.exe 2504 imsQUAII.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2432 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 28 PID 2392 wrote to memory of 2432 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 28 PID 2392 wrote to memory of 2432 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 28 PID 2392 wrote to memory of 2432 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 28 PID 2392 wrote to memory of 2504 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 30 PID 2392 wrote to memory of 2504 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 30 PID 2392 wrote to memory of 2504 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 30 PID 2392 wrote to memory of 2504 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 30 PID 2392 wrote to memory of 1992 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 31 PID 2392 wrote to memory of 1992 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 31 PID 2392 wrote to memory of 1992 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 31 PID 2392 wrote to memory of 1992 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 31 PID 1992 wrote to memory of 764 1992 cmd.exe 33 PID 1992 wrote to memory of 764 1992 cmd.exe 33 PID 1992 wrote to memory of 764 1992 cmd.exe 33 PID 1992 wrote to memory of 764 1992 cmd.exe 33 PID 2392 wrote to memory of 2520 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 34 PID 2392 wrote to memory of 2520 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 34 PID 2392 wrote to memory of 2520 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 34 PID 2392 wrote to memory of 2520 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 34 PID 2392 wrote to memory of 2516 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 35 PID 2392 wrote to memory of 2516 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 35 PID 2392 wrote to memory of 2516 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 35 PID 2392 wrote to memory of 2516 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 35 PID 2392 wrote to memory of 2636 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 36 PID 2392 wrote to memory of 2636 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 36 PID 2392 wrote to memory of 2636 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 36 PID 2392 wrote to memory of 2636 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 36 PID 2392 wrote to memory of 924 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 38 PID 2392 wrote to memory of 924 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 38 PID 2392 wrote to memory of 924 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 38 PID 2392 wrote to memory of 924 2392 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 38 PID 764 wrote to memory of 1888 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 42 PID 764 wrote to memory of 1888 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 42 PID 764 wrote to memory of 1888 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 42 PID 764 wrote to memory of 1888 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 42 PID 924 wrote to memory of 1736 924 cmd.exe 44 PID 924 wrote to memory of 1736 924 cmd.exe 44 PID 924 wrote to memory of 1736 924 cmd.exe 44 PID 924 wrote to memory of 1736 924 cmd.exe 44 PID 764 wrote to memory of 1196 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 45 PID 764 wrote to memory of 1196 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 45 PID 764 wrote to memory of 1196 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 45 PID 764 wrote to memory of 1196 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 45 PID 764 wrote to memory of 1740 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 46 PID 764 wrote to memory of 1740 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 46 PID 764 wrote to memory of 1740 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 46 PID 764 wrote to memory of 1740 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 46 PID 1888 wrote to memory of 1000 1888 cmd.exe 47 PID 1888 wrote to memory of 1000 1888 cmd.exe 47 PID 1888 wrote to memory of 1000 1888 cmd.exe 47 PID 1888 wrote to memory of 1000 1888 cmd.exe 47 PID 764 wrote to memory of 864 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 48 PID 764 wrote to memory of 864 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 48 PID 764 wrote to memory of 864 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 48 PID 764 wrote to memory of 864 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 48 PID 764 wrote to memory of 2496 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 49 PID 764 wrote to memory of 2496 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 49 PID 764 wrote to memory of 2496 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 49 PID 764 wrote to memory of 2496 764 2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe 49 PID 2496 wrote to memory of 2200 2496 cmd.exe 54 PID 2496 wrote to memory of 2200 2496 cmd.exe 54 PID 2496 wrote to memory of 2200 2496 cmd.exe 54 PID 2496 wrote to memory of 2200 2496 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\rsUIkksI\JOEIcwgU.exe"C:\Users\Admin\rsUIkksI\JOEIcwgU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2432
-
-
C:\ProgramData\pqAoUsYQ\imsQUAII.exe"C:\ProgramData\pqAoUsYQ\imsQUAII.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2504
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"6⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"8⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"10⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2968 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"12⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"14⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"16⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"18⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"20⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"22⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"24⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"26⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"28⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"30⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:792 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"32⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"34⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"36⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"38⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"40⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"42⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"44⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"46⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"48⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"50⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"52⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"54⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"56⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"58⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"60⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"62⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"64⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock65⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"66⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock67⤵PID:1740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"68⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock69⤵PID:624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"70⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock71⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"72⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock73⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"74⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock75⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"76⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock77⤵PID:2748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"78⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock79⤵PID:1196
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"80⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock81⤵PID:2784
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"82⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock83⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"84⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock85⤵PID:2340
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"86⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock87⤵PID:644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"88⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock89⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"90⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock91⤵PID:2776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"92⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock93⤵PID:1804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"94⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock95⤵PID:2332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"96⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock97⤵PID:2108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"98⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock99⤵PID:1004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"100⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock101⤵PID:524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"102⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock103⤵PID:776
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"104⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock105⤵PID:1724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"106⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock107⤵PID:1536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"108⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock109⤵PID:2292
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"110⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock111⤵PID:600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"112⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock113⤵PID:1712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"114⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock115⤵PID:3012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"116⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock117⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"118⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock119⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"120⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock121⤵PID:2772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-18_401dbbf4b8f35ef9f4b5fdc9ffc5ffe0_virlock"122⤵PID:1640
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-