Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe
-
Size
196KB
-
MD5
38e74eec51a199732f6c945675934e66
-
SHA1
c3909e82c3af1d14d479e51c53d01ce813019169
-
SHA256
54b9a1eb70ff5cbe24232176571fc0f76b58091a6a11efc161a1705b298a4f36
-
SHA512
9f94bd8361632dbf915fc375b46c7f82a2bf30affed27af8091ff290b79bc07e14694b4b6f6f7221b87689df0822aac334b66bf7d720f57c0364d7ea799bd81a
-
SSDEEP
3072:TrfEcLvtDS4zMQTOeDmowHDU7nJgG3lZV9bxsesHUMQZAf6w:3fEcTGQi6m5jU7nxj9bxZjZZw
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
kYQYwcUA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation kYQYwcUA.exe -
Executes dropped EXE 2 IoCs
Processes:
BUkMEUcI.exekYQYwcUA.exepid process 2928 BUkMEUcI.exe 2592 kYQYwcUA.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exekYQYwcUA.exepid process 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exekYQYwcUA.exeBUkMEUcI.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\BUkMEUcI.exe = "C:\\Users\\Admin\\SMIMYoEo\\BUkMEUcI.exe" 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kYQYwcUA.exe = "C:\\ProgramData\\tOwoYcUU\\kYQYwcUA.exe" 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\kYQYwcUA.exe = "C:\\ProgramData\\tOwoYcUU\\kYQYwcUA.exe" kYQYwcUA.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\BUkMEUcI.exe = "C:\\Users\\Admin\\SMIMYoEo\\BUkMEUcI.exe" BUkMEUcI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 2520 reg.exe 2628 reg.exe 1752 reg.exe 332 reg.exe 412 reg.exe 2944 reg.exe 888 reg.exe 1560 reg.exe 1956 reg.exe 1616 reg.exe 1372 reg.exe 2400 reg.exe 1992 reg.exe 3032 reg.exe 1224 reg.exe 1544 reg.exe 2932 reg.exe 2128 reg.exe 1212 reg.exe 1616 reg.exe 2272 reg.exe 2300 reg.exe 1120 reg.exe 1148 reg.exe 644 reg.exe 1636 reg.exe 2492 reg.exe 1784 reg.exe 2124 reg.exe 2532 reg.exe 1784 reg.exe 2180 reg.exe 2288 reg.exe 2288 reg.exe 2664 reg.exe 2484 reg.exe 1696 reg.exe 1848 reg.exe 632 reg.exe 1028 reg.exe 1296 reg.exe 2656 reg.exe 1988 reg.exe 1900 reg.exe 2020 reg.exe 1800 reg.exe 2664 reg.exe 2268 reg.exe 2532 reg.exe 2080 reg.exe 2404 reg.exe 2848 reg.exe 2056 reg.exe 2040 reg.exe 380 reg.exe 2888 reg.exe 2588 reg.exe 2524 reg.exe 1424 reg.exe 1192 reg.exe 320 reg.exe 2020 reg.exe 2192 reg.exe 2104 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exepid process 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2056 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2056 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1252 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1252 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 532 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 532 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 292 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 292 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2836 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2836 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2112 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2112 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1556 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1556 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2068 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2068 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1028 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1028 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 800 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 800 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2564 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2564 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1996 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1996 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1288 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1288 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2348 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2348 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2956 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2956 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1224 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1224 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2264 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2264 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1568 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1568 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2292 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2292 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1372 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1372 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 412 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 412 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2172 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2172 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1016 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1016 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1736 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1736 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1368 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1368 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2200 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2200 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1160 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1160 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1028 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 1028 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2472 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2472 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2624 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe 2624 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
kYQYwcUA.exepid process 2592 kYQYwcUA.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
kYQYwcUA.exepid process 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe 2592 kYQYwcUA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-04-28_38e74eec51a199732f6c945675934e66_virlock.execmd.execmd.exe2024-04-28_38e74eec51a199732f6c945675934e66_virlock.execmd.execmd.exedescription pid process target process PID 2552 wrote to memory of 2928 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe BUkMEUcI.exe PID 2552 wrote to memory of 2928 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe BUkMEUcI.exe PID 2552 wrote to memory of 2928 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe BUkMEUcI.exe PID 2552 wrote to memory of 2928 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe BUkMEUcI.exe PID 2552 wrote to memory of 2592 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe kYQYwcUA.exe PID 2552 wrote to memory of 2592 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe kYQYwcUA.exe PID 2552 wrote to memory of 2592 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe kYQYwcUA.exe PID 2552 wrote to memory of 2592 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe kYQYwcUA.exe PID 2552 wrote to memory of 2528 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2528 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2528 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2528 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2528 wrote to memory of 1720 2528 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2528 wrote to memory of 1720 2528 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2528 wrote to memory of 1720 2528 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2528 wrote to memory of 1720 2528 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2552 wrote to memory of 2664 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2664 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2664 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2664 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2408 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2408 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2408 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2408 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2532 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2532 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2532 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2532 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 2552 wrote to memory of 2388 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2388 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2388 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2552 wrote to memory of 2388 2552 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2388 wrote to memory of 2796 2388 cmd.exe cscript.exe PID 2388 wrote to memory of 2796 2388 cmd.exe cscript.exe PID 2388 wrote to memory of 2796 2388 cmd.exe cscript.exe PID 2388 wrote to memory of 2796 2388 cmd.exe cscript.exe PID 1720 wrote to memory of 2820 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2820 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2820 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2820 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2820 wrote to memory of 2056 2820 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2820 wrote to memory of 2056 2820 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2820 wrote to memory of 2056 2820 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 2820 wrote to memory of 2056 2820 cmd.exe 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe PID 1720 wrote to memory of 1532 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 1532 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 1532 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 1532 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2284 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2284 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2284 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2284 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2128 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2128 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2128 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2128 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe reg.exe PID 1720 wrote to memory of 2092 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2092 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2092 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 1720 wrote to memory of 2092 1720 2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe cmd.exe PID 2092 wrote to memory of 1088 2092 cmd.exe cscript.exe PID 2092 wrote to memory of 1088 2092 cmd.exe cscript.exe PID 2092 wrote to memory of 1088 2092 cmd.exe cscript.exe PID 2092 wrote to memory of 1088 2092 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\SMIMYoEo\BUkMEUcI.exe"C:\Users\Admin\SMIMYoEo\BUkMEUcI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2928 -
C:\ProgramData\tOwoYcUU\kYQYwcUA.exe"C:\ProgramData\tOwoYcUU\kYQYwcUA.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"6⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1252 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"8⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:532 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"10⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"12⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"14⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"16⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"18⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"20⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"22⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:800 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"24⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"26⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"28⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"30⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"32⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"34⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"36⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"38⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"40⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"42⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"44⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"46⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"48⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"50⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"52⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"54⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"56⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"58⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"60⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"62⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"64⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock65⤵PID:2364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"66⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock67⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"68⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock69⤵PID:1308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"70⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock71⤵PID:1212
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"72⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock73⤵PID:2432
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"74⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock75⤵PID:1224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"76⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock77⤵PID:1704
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"78⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock79⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"80⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock81⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"82⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock83⤵PID:920
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"84⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock85⤵PID:2556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"86⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock87⤵PID:2492
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"88⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock89⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"90⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock91⤵PID:1368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"92⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock93⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"94⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock95⤵PID:3028
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"96⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock97⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"98⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock99⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"100⤵PID:1332
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock101⤵PID:1612
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"102⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock103⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"104⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock105⤵PID:1640
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"106⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock107⤵PID:336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"108⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock109⤵PID:2096
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"110⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock111⤵PID:1852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"112⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock113⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"114⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock115⤵PID:1036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"116⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock117⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"118⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock119⤵PID:2868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"120⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock121⤵PID:632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"122⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock123⤵PID:1864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"124⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock125⤵PID:2312
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"126⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock127⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"128⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock129⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"130⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock131⤵PID:500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"132⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock133⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"134⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock135⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"136⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock137⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"138⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock139⤵PID:2864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"140⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock141⤵PID:1036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"142⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock143⤵PID:708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"144⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock145⤵PID:968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"146⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock147⤵PID:1444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"148⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock149⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"150⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock151⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"152⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock153⤵PID:916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"154⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock155⤵PID:1208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"156⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock157⤵PID:284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"158⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock159⤵PID:1524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"160⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock161⤵PID:2072
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"162⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock163⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"164⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock165⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"166⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock167⤵PID:1464
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"168⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock169⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"170⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock171⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"172⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock173⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"174⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock175⤵PID:1616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"176⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock177⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"178⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock179⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"180⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock181⤵PID:2632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"182⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock183⤵PID:2964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"184⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock185⤵PID:2400
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"186⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock187⤵PID:2284
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"188⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock189⤵PID:1684
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"190⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock191⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"192⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock193⤵PID:2064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"194⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock195⤵PID:1264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"196⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock197⤵PID:2388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"198⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock199⤵PID:2264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"200⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock201⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"202⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock203⤵PID:1900
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"204⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock205⤵PID:2348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"206⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock207⤵PID:1888
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"208⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock209⤵PID:2480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"210⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock211⤵PID:1932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"212⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock213⤵PID:112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"214⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock215⤵PID:2460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"216⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock217⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"218⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock219⤵PID:1232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"220⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock221⤵PID:1596
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"222⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock223⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"224⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock225⤵PID:2300
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"226⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock227⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"228⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock229⤵PID:2368
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"230⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock231⤵PID:1764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"232⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock233⤵PID:272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"234⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock235⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"236⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock237⤵PID:632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"238⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock239⤵PID:1264
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"240⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock241⤵PID:1984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-04-28_38e74eec51a199732f6c945675934e66_virlock"242⤵PID:2408