Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 03:56
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe
-
Size
192KB
-
MD5
c534263fb8f5357f570835ee30329566
-
SHA1
f60c52e34273fa9afb960feff46201c657c18b9a
-
SHA256
b43b9a418b25a472db7bc40bd0393681931d1bf44bd29cacddfda8e447704e39
-
SHA512
351cfb0d8a3f5359a99147ab0a7ad656f5f2f26eb5a8e237f19ccb35bbfc362a134ab436b3d62eb25dba03b71d65cdff839075f70cd5fb23277a8f964f02df7f
-
SSDEEP
6144:1HDk+dYQ+tsJzDJFwvDusfC5PtzH2X8vNObT:xDk+x+ts/FwLuPtCMvNS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" -
Renames multiple (84) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 4 IoCs
Processes:
sihclient.exeflow pid process 41 4216 sihclient.exe 45 4216 sihclient.exe 47 4216 sihclient.exe 49 4216 sihclient.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
eeMMwQYw.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation eeMMwQYw.exe -
Executes dropped EXE 2 IoCs
Processes:
eeMMwQYw.exeSsIkgIEw.exepid process 1752 eeMMwQYw.exe 1664 SsIkgIEw.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
SsIkgIEw.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeeeMMwQYw.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SsIkgIEw.exe = "C:\\ProgramData\\kkUUcwIs\\SsIkgIEw.exe" SsIkgIEw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eeMMwQYw.exe = "C:\\Users\\Admin\\JWEsIEcM\\eeMMwQYw.exe" 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SsIkgIEw.exe = "C:\\ProgramData\\kkUUcwIs\\SsIkgIEw.exe" 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eeMMwQYw.exe = "C:\\Users\\Admin\\JWEsIEcM\\eeMMwQYw.exe" eeMMwQYw.exe -
Drops file in System32 directory 1 IoCs
Processes:
eeMMwQYw.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe eeMMwQYw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 4360 reg.exe 2564 reg.exe 1400 reg.exe 3596 4184 1856 3604 reg.exe 3416 reg.exe 4068 reg.exe 4496 reg.exe 2320 reg.exe 3120 4964 3048 reg.exe 1648 reg.exe 4996 reg.exe 1800 reg.exe 3972 reg.exe 3016 reg.exe 2204 reg.exe 3588 reg.exe 4412 reg.exe 964 2320 reg.exe 1372 reg.exe 404 2020 reg.exe 1632 reg.exe 4792 reg.exe 3652 reg.exe 4476 reg.exe 4252 reg.exe 1984 reg.exe 2512 reg.exe 1768 reg.exe 2740 reg.exe 5100 reg.exe 2136 reg.exe 5084 reg.exe 2348 reg.exe 4404 reg.exe 1184 reg.exe 4084 reg.exe 4432 reg.exe 1220 reg.exe 3548 reg.exe 4064 reg.exe 2612 reg.exe 5100 reg.exe 1448 reg.exe 4036 reg.exe 1244 reg.exe 4808 1696 reg.exe 3592 reg.exe 3548 reg.exe 4624 reg.exe 4808 1168 reg.exe 3640 reg.exe 4416 reg.exe 4684 reg.exe 4068 reg.exe 4824 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exepid process 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1508 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1508 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1508 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1508 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1364 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1364 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1364 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1364 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3952 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3952 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3952 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3952 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4884 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4884 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4884 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4884 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2376 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2376 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2376 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2376 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2308 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2308 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2308 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2308 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1016 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1016 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1016 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1016 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2608 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2608 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2608 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 2608 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4744 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4744 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4744 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 4744 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1828 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1828 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1828 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 1828 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 408 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 408 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 408 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 408 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3856 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3856 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3856 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 3856 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 5108 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 5108 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 5108 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe 5108 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
eeMMwQYw.exepid process 1752 eeMMwQYw.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
eeMMwQYw.exepid process 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe 1752 eeMMwQYw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-26_c534263fb8f5357f570835ee30329566_virlock.execmd.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.execmd.execmd.execmd.exe2024-05-26_c534263fb8f5357f570835ee30329566_virlock.execmd.exedescription pid process target process PID 1948 wrote to memory of 1752 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe eeMMwQYw.exe PID 1948 wrote to memory of 1752 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe eeMMwQYw.exe PID 1948 wrote to memory of 1752 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe eeMMwQYw.exe PID 1948 wrote to memory of 1664 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe SsIkgIEw.exe PID 1948 wrote to memory of 1664 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe SsIkgIEw.exe PID 1948 wrote to memory of 1664 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe SsIkgIEw.exe PID 1948 wrote to memory of 3604 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 1948 wrote to memory of 3604 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 1948 wrote to memory of 3604 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3604 wrote to memory of 3300 3604 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 3604 wrote to memory of 3300 3604 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 3604 wrote to memory of 3300 3604 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 1948 wrote to memory of 1696 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 1696 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 1696 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 3084 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 3084 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 3084 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 1232 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 1232 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 1232 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 1948 wrote to memory of 3836 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 1948 wrote to memory of 3836 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 1948 wrote to memory of 3836 1948 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 2428 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 2428 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 2428 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 1804 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 1804 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 1804 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 4092 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 4092 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 4092 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 3308 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 3308 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 3308 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3300 wrote to memory of 1084 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 1084 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3300 wrote to memory of 1084 3300 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3836 wrote to memory of 2364 3836 cmd.exe cscript.exe PID 3836 wrote to memory of 2364 3836 cmd.exe cscript.exe PID 3836 wrote to memory of 2364 3836 cmd.exe cscript.exe PID 2428 wrote to memory of 3756 2428 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 2428 wrote to memory of 3756 2428 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 2428 wrote to memory of 3756 2428 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 1084 wrote to memory of 3468 1084 cmd.exe cscript.exe PID 1084 wrote to memory of 3468 1084 cmd.exe cscript.exe PID 1084 wrote to memory of 3468 1084 cmd.exe cscript.exe PID 3756 wrote to memory of 1552 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3756 wrote to memory of 1552 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 3756 wrote to memory of 1552 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe PID 1552 wrote to memory of 1508 1552 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 1552 wrote to memory of 1508 1552 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 1552 wrote to memory of 1508 1552 cmd.exe 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe PID 3756 wrote to memory of 2320 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 2320 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 2320 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 2612 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 2612 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 2612 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 1168 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 1168 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 1168 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe reg.exe PID 3756 wrote to memory of 388 3756 2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\JWEsIEcM\eeMMwQYw.exe"C:\Users\Admin\JWEsIEcM\eeMMwQYw.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1752 -
C:\ProgramData\kkUUcwIs\SsIkgIEw.exe"C:\ProgramData\kkUUcwIs\SsIkgIEw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"8⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"10⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:3952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"12⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"14⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"16⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"18⤵PID:3484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"20⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"22⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"24⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"26⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"28⤵PID:3692
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"30⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"32⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock33⤵PID:3080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"34⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock35⤵PID:4616
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"36⤵PID:3868
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock37⤵PID:4684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"38⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock39⤵PID:3188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"40⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock41⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"42⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock43⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"44⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock45⤵PID:780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"46⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock47⤵PID:3576
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"48⤵PID:2312
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock49⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"50⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock51⤵PID:4236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"52⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock53⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"54⤵PID:3604
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV155⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock55⤵PID:1432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"56⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock57⤵PID:2376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"58⤵PID:2444
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV159⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock59⤵PID:1568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"60⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock61⤵PID:2288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"62⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock63⤵PID:5072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"64⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock65⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"66⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock67⤵PID:2364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"68⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock69⤵PID:436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"70⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock71⤵PID:1180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"72⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock73⤵PID:2772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"74⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock75⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"76⤵PID:2020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock77⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"78⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock79⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"80⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock81⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"82⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV183⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock83⤵PID:3880
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"84⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock85⤵PID:2848
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"86⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock87⤵PID:3388
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"88⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock89⤵PID:4624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"90⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock91⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"92⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock93⤵PID:1768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"94⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock95⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"96⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock97⤵PID:4876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"98⤵PID:3304
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV199⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock99⤵PID:2308
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"100⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock101⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"102⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock103⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"104⤵PID:3900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock105⤵PID:3028
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"106⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock107⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"108⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock109⤵PID:3280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"110⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock111⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"112⤵PID:3652
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1113⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock113⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"114⤵PID:3504
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock115⤵PID:4980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"116⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock117⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"118⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock119⤵PID:4432
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"120⤵PID:3712
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1121⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock121⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"122⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock123⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"124⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock125⤵PID:392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"126⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock127⤵PID:4732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"128⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock129⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"130⤵PID:4680
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1131⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock131⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"132⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock133⤵PID:2512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"134⤵PID:1768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1135⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock135⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"136⤵PID:3464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1137⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock137⤵PID:2608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"138⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock139⤵PID:3608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"140⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock141⤵PID:1632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"142⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock143⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"144⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock145⤵PID:2032
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"146⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock147⤵PID:4592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"148⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock149⤵PID:4996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"150⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock151⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"152⤵PID:4228
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1153⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock153⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"154⤵PID:4444
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1155⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock155⤵PID:2312
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"156⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock157⤵PID:3952
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"158⤵PID:3548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1159⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock159⤵PID:2436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"160⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock161⤵PID:516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"162⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock163⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"164⤵PID:4800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1165⤵PID:4728
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock165⤵PID:2320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"166⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock167⤵PID:2708
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"168⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock169⤵PID:2204
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"170⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock171⤵PID:4904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"172⤵PID:3808
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1173⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock173⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"174⤵PID:8
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1175⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock175⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"176⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock177⤵PID:556
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"178⤵PID:2280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock179⤵PID:4372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"180⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock181⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"182⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock183⤵PID:5048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"184⤵PID:3004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1185⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock185⤵PID:4192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"186⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock187⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"188⤵PID:4936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1189⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock189⤵PID:4412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"190⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock191⤵PID:4716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"192⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock193⤵PID:4036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"194⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock195⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"196⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock197⤵PID:4596
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"198⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock199⤵PID:3600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"200⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock201⤵PID:4944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"202⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock203⤵PID:2568
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"204⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock205⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"206⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock207⤵PID:3224
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"208⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock209⤵PID:4228
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"210⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock211⤵PID:4924
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"212⤵PID:3416
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1213⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock213⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"214⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock215⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"216⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock217⤵PID:3692
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"218⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock219⤵PID:3292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"220⤵PID:4004
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1221⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock221⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"222⤵PID:2760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1223⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock223⤵PID:2992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"224⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock225⤵PID:3484
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"226⤵PID:4320
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock227⤵PID:4780
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"228⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock229⤵PID:2008
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"230⤵PID:1244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1231⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock231⤵PID:1372
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"232⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock233⤵PID:5100
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"234⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock235⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"236⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock237⤵PID:4748
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"238⤵PID:4876
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1239⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock239⤵PID:1776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"240⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock241⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_c534263fb8f5357f570835ee30329566_virlock"242⤵PID:3468