Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25-04-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe
-
Size
117KB
-
MD5
4d2a0000e8b80138e34fff2160604a43
-
SHA1
3b0293b47fcb08075e55ae1c1af3422efc8ef7ec
-
SHA256
a5e72172323fd43fec1f6bdd73a814ab16dc3b29d3b211ec8ddcc7032c35a706
-
SHA512
6500bebcea9874c11742d5a85458a0c9ae2c118ae97723c350b0cbdad8078bacb4fae64cf80c6a6b9e403f3c9aaad5537a1c0dfe027ed9d0e175b88fe744a3e4
-
SSDEEP
3072:VQVFWhYyfIUBJjgcSv8aJ9QkHs4iqxIfr6adnBa8+RCoo:Vvh3dBJ28aB/Iz6+Ba7RCv
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SMQgAwoc.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Control Panel\International\Geo\Nation SMQgAwoc.exe -
Executes dropped EXE 2 IoCs
Processes:
SMQgAwoc.exetOcYMcIs.exepid process 1468 SMQgAwoc.exe 2192 tOcYMcIs.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeSMQgAwoc.exepid process 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeSMQgAwoc.exetOcYMcIs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SMQgAwoc.exe = "C:\\Users\\Admin\\kYgMQsoA\\SMQgAwoc.exe" 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tOcYMcIs.exe = "C:\\ProgramData\\nqgQEwkI\\tOcYMcIs.exe" 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SMQgAwoc.exe = "C:\\Users\\Admin\\kYgMQsoA\\SMQgAwoc.exe" SMQgAwoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\tOcYMcIs.exe = "C:\\ProgramData\\nqgQEwkI\\tOcYMcIs.exe" tOcYMcIs.exe -
Drops file in Windows directory 1 IoCs
Processes:
SMQgAwoc.exedescription ioc process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico SMQgAwoc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1584 reg.exe 1104 reg.exe 1440 reg.exe 1588 reg.exe 1952 reg.exe 1600 reg.exe 1688 reg.exe 2764 reg.exe 2528 reg.exe 1296 reg.exe 1184 reg.exe 952 reg.exe 2488 reg.exe 2140 reg.exe 2320 reg.exe 1984 reg.exe 1080 reg.exe 2912 reg.exe 1584 reg.exe 2472 reg.exe 1048 reg.exe 772 reg.exe 2268 reg.exe 1900 reg.exe 2040 reg.exe 2152 reg.exe 2164 reg.exe 1616 reg.exe 1580 reg.exe 752 reg.exe 1644 reg.exe 2864 reg.exe 2636 reg.exe 2992 reg.exe 1644 reg.exe 1192 reg.exe 1864 reg.exe 1432 reg.exe 2152 reg.exe 2588 reg.exe 2844 reg.exe 1548 reg.exe 2724 reg.exe 3036 reg.exe 3000 reg.exe 908 reg.exe 2992 reg.exe 2912 reg.exe 2312 reg.exe 3008 reg.exe 2660 reg.exe 2900 reg.exe 1880 reg.exe 2920 reg.exe 2688 reg.exe 1684 reg.exe 1604 reg.exe 2252 reg.exe 540 reg.exe 2776 reg.exe 404 reg.exe 1708 reg.exe 2944 reg.exe 2840 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exepid process 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2108 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2108 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2844 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2844 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2032 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2032 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2004 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2004 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2920 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2920 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2608 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2608 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2784 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2784 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 3012 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 3012 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1672 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1672 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1288 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1288 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1744 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1744 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2920 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2920 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2668 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2668 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2544 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2544 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1136 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1136 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1776 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 1776 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 404 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 404 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2004 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2004 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 952 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 952 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2632 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2632 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2268 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2268 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2580 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2580 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2980 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2980 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2584 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2584 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2688 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2688 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 576 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 576 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2460 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2460 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2012 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2012 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2764 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2764 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2308 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe 2308 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SMQgAwoc.exepid process 1468 SMQgAwoc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
SMQgAwoc.exepid process 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe 1468 SMQgAwoc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.execmd.execmd.exe2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.execmd.execmd.exedescription pid process target process PID 824 wrote to memory of 1468 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe SMQgAwoc.exe PID 824 wrote to memory of 1468 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe SMQgAwoc.exe PID 824 wrote to memory of 1468 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe SMQgAwoc.exe PID 824 wrote to memory of 1468 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe SMQgAwoc.exe PID 824 wrote to memory of 2192 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe tOcYMcIs.exe PID 824 wrote to memory of 2192 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe tOcYMcIs.exe PID 824 wrote to memory of 2192 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe tOcYMcIs.exe PID 824 wrote to memory of 2192 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe tOcYMcIs.exe PID 824 wrote to memory of 2236 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2236 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2236 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2236 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2236 wrote to memory of 2640 2236 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2236 wrote to memory of 2640 2236 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2236 wrote to memory of 2640 2236 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2236 wrote to memory of 2640 2236 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 824 wrote to memory of 2676 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2676 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2676 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2676 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2720 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2720 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2720 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2720 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2556 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2556 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2556 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2556 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 824 wrote to memory of 2892 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2892 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2892 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 824 wrote to memory of 2892 824 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2892 wrote to memory of 2616 2892 cmd.exe cscript.exe PID 2892 wrote to memory of 2616 2892 cmd.exe cscript.exe PID 2892 wrote to memory of 2616 2892 cmd.exe cscript.exe PID 2892 wrote to memory of 2616 2892 cmd.exe cscript.exe PID 2640 wrote to memory of 2712 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2712 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2712 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2712 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2712 wrote to memory of 2108 2712 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2712 wrote to memory of 2108 2712 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2712 wrote to memory of 2108 2712 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2712 wrote to memory of 2108 2712 cmd.exe 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe PID 2640 wrote to memory of 2240 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 2240 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 2240 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 2240 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 3000 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 3000 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 3000 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 3000 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 1728 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 1728 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 1728 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 1728 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe reg.exe PID 2640 wrote to memory of 2820 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2820 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2820 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2640 wrote to memory of 2820 2640 2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe cmd.exe PID 2820 wrote to memory of 2800 2820 cmd.exe cscript.exe PID 2820 wrote to memory of 2800 2820 cmd.exe cscript.exe PID 2820 wrote to memory of 2800 2820 cmd.exe cscript.exe PID 2820 wrote to memory of 2800 2820 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\kYgMQsoA\SMQgAwoc.exe"C:\Users\Admin\kYgMQsoA\SMQgAwoc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1468
-
-
C:\ProgramData\nqgQEwkI\tOcYMcIs.exe"C:\ProgramData\nqgQEwkI\tOcYMcIs.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2192
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"6⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"8⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"10⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"12⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"14⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"16⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"18⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"20⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"22⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"24⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"26⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"28⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"30⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"32⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"34⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"36⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:404 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"38⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"40⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"42⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"44⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"46⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"48⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"50⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"52⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"54⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"56⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"58⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"60⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"62⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"64⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock65⤵PID:2804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"66⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock67⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"68⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock69⤵PID:2208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"70⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock71⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"72⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock73⤵PID:1204
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"74⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock75⤵PID:2904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"76⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock77⤵PID:2612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"78⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock79⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"80⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock81⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"82⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock83⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"84⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock85⤵PID:2524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"86⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock87⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"88⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock89⤵PID:1896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"90⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock91⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"92⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock93⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"94⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock95⤵PID:668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"96⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock97⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"98⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock99⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"100⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock101⤵PID:952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"102⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock103⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"104⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock105⤵PID:772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"106⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock107⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"108⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock109⤵PID:1208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"110⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock111⤵PID:320
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"112⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock113⤵PID:2604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"114⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock115⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"116⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock117⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"118⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock119⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"120⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock121⤵PID:1592
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-25_4d2a0000e8b80138e34fff2160604a43_virlock"122⤵PID:1092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-