Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
-
Size
186KB
-
MD5
f42ce0e64a3d2f7354f003349e7cdf8c
-
SHA1
4c7ee52a1e9b7aabecf7574975a9d16823a4adbd
-
SHA256
a2b770179bb3c0ca242e748870a62017e2fbfd4a669a27cae94f7fe3a2357bc3
-
SHA512
704b352efd4fcaf4eed028b773928f085f2b643cba10ab5e92e999eecd3625b92ad0befd7a71322c949c681f4bfd607d8c8f1e1bd5f0a8701677c290443d0c71
-
SSDEEP
3072:VanwoG/J9JL1t2TwgplBFi7NRux1/O7cp7yVL36XaurGJO1euGi939jIhl:Wwf/vJL1E3nBFFH/O7cp7qbgaXQ1euGJ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
OIcAoQgk.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Control Panel\International\Geo\Nation OIcAoQgk.exe -
Executes dropped EXE 2 IoCs
Processes:
OIcAoQgk.exedyUIkQQc.exepid process 2136 OIcAoQgk.exe 2288 dyUIkQQc.exe -
Loads dropped DLL 20 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeOIcAoQgk.exepid process 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeOIcAoQgk.exedyUIkQQc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\qeccggYc.exe = "C:\\Users\\Admin\\gKIMcsIA\\qeccggYc.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lmcQkcww.exe = "C:\\ProgramData\\WaIoUkEM\\lmcQkcww.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\OIcAoQgk.exe = "C:\\Users\\Admin\\soogcMYQ\\OIcAoQgk.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dyUIkQQc.exe = "C:\\ProgramData\\GysQUMsc\\dyUIkQQc.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\OIcAoQgk.exe = "C:\\Users\\Admin\\soogcMYQ\\OIcAoQgk.exe" OIcAoQgk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\dyUIkQQc.exe = "C:\\ProgramData\\GysQUMsc\\dyUIkQQc.exe" dyUIkQQc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2700 2680 WerFault.exe qeccggYc.exe 2720 2204 WerFault.exe lmcQkcww.exe -
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 828 reg.exe 2328 reg.exe 1640 reg.exe 2764 reg.exe 2800 reg.exe 2824 reg.exe 2868 reg.exe 2604 reg.exe 2384 reg.exe 2784 reg.exe 1440 reg.exe 2204 reg.exe 1516 reg.exe 2284 reg.exe 2452 reg.exe 1848 reg.exe 316 reg.exe 2848 reg.exe 2132 reg.exe 2648 reg.exe 1684 reg.exe 1552 reg.exe 2672 reg.exe 2452 reg.exe 2380 reg.exe 2452 reg.exe 2840 reg.exe 2272 reg.exe 2524 reg.exe 1968 reg.exe 2924 reg.exe 2280 reg.exe 2068 reg.exe 1788 reg.exe 1856 reg.exe 3068 reg.exe 2360 reg.exe 1592 reg.exe 1844 reg.exe 2552 reg.exe 1156 reg.exe 600 reg.exe 1856 reg.exe 1768 reg.exe 868 reg.exe 1968 reg.exe 1240 reg.exe 268 reg.exe 2076 reg.exe 2008 reg.exe 1064 reg.exe 2644 reg.exe 2192 reg.exe 1280 reg.exe 2740 reg.exe 2148 reg.exe 2100 reg.exe 2336 reg.exe 2016 reg.exe 3000 reg.exe 1748 reg.exe 2492 reg.exe 2140 reg.exe 2724 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exepid process 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2660 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2660 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1648 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1648 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1104 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1104 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1856 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1856 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1812 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1812 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2328 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2328 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2808 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2808 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1704 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1704 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 904 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 904 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2300 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2300 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1336 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1336 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1812 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1812 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2840 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2840 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1904 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1904 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1728 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1728 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 648 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 648 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1580 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1580 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2524 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2524 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1060 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1060 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2228 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2228 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1748 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1748 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 832 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 832 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2824 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2824 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1856 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1856 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2656 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2656 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2016 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2016 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1836 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1836 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 304 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 304 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1916 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 1916 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2612 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2612 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
OIcAoQgk.exepid process 2136 OIcAoQgk.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
OIcAoQgk.exepid process 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe 2136 OIcAoQgk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.execmd.execmd.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.execmd.execmd.exedescription pid process target process PID 1532 wrote to memory of 2136 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe OIcAoQgk.exe PID 1532 wrote to memory of 2136 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe OIcAoQgk.exe PID 1532 wrote to memory of 2136 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe OIcAoQgk.exe PID 1532 wrote to memory of 2136 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe OIcAoQgk.exe PID 1532 wrote to memory of 2288 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe dyUIkQQc.exe PID 1532 wrote to memory of 2288 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe dyUIkQQc.exe PID 1532 wrote to memory of 2288 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe dyUIkQQc.exe PID 1532 wrote to memory of 2288 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe dyUIkQQc.exe PID 1532 wrote to memory of 2736 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2736 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2736 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2736 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2736 wrote to memory of 2624 2736 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2736 wrote to memory of 2624 2736 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2736 wrote to memory of 2624 2736 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2736 wrote to memory of 2624 2736 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 1532 wrote to memory of 3008 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 3008 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 3008 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 3008 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2620 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2620 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2620 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2620 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2708 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2708 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2708 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2708 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 1532 wrote to memory of 2492 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2492 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2492 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1532 wrote to memory of 2492 1532 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2492 wrote to memory of 2480 2492 cmd.exe cscript.exe PID 2492 wrote to memory of 2480 2492 cmd.exe cscript.exe PID 2492 wrote to memory of 2480 2492 cmd.exe cscript.exe PID 2492 wrote to memory of 2480 2492 cmd.exe cscript.exe PID 2624 wrote to memory of 788 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 788 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 788 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 788 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 788 wrote to memory of 2660 788 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 788 wrote to memory of 2660 788 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 788 wrote to memory of 2660 788 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 788 wrote to memory of 2660 788 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2624 wrote to memory of 2764 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2764 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2764 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2764 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2656 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2656 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2656 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2656 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2812 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2812 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2812 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2812 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2624 wrote to memory of 2900 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 2900 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 2900 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2624 wrote to memory of 2900 2624 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2900 wrote to memory of 1956 2900 cmd.exe cscript.exe PID 2900 wrote to memory of 1956 2900 cmd.exe cscript.exe PID 2900 wrote to memory of 1956 2900 cmd.exe cscript.exe PID 2900 wrote to memory of 1956 2900 cmd.exe cscript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\soogcMYQ\OIcAoQgk.exe"C:\Users\Admin\soogcMYQ\OIcAoQgk.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2136 -
C:\ProgramData\GysQUMsc\dyUIkQQc.exe"C:\ProgramData\GysQUMsc\dyUIkQQc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2288 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"6⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:1648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"8⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"10⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"12⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"14⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"16⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"18⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"20⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"22⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"24⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"26⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:1812 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"28⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"30⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:1904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"32⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock33⤵
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"34⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock35⤵
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"36⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock37⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"38⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock39⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"40⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock41⤵
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"42⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock43⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"44⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock45⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"46⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock47⤵
- Suspicious behavior: EnumeratesProcesses
PID:832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"48⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock49⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"50⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock51⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"52⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock53⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"54⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock55⤵
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"56⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock57⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"58⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock59⤵
- Suspicious behavior: EnumeratesProcesses
PID:304 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"60⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock61⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"62⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock63⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"64⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock65⤵PID:1580
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"66⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock67⤵PID:484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"68⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock69⤵PID:2852
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"70⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock71⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"72⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock73⤵
- Adds Run key to start application
PID:2064 -
C:\Users\Admin\gKIMcsIA\qeccggYc.exe"C:\Users\Admin\gKIMcsIA\qeccggYc.exe"74⤵PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 3675⤵
- Program crash
PID:2700 -
C:\ProgramData\WaIoUkEM\lmcQkcww.exe"C:\ProgramData\WaIoUkEM\lmcQkcww.exe"74⤵PID:2204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 3675⤵
- Program crash
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"74⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock75⤵PID:2600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"76⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock77⤵PID:3060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"78⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock79⤵PID:2504
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"80⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock81⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"82⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock83⤵PID:268
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"84⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock85⤵PID:1524
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"86⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock87⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"88⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock89⤵PID:1552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"90⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock91⤵PID:2840
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"92⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock93⤵PID:2352
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"94⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock95⤵PID:2648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"96⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock97⤵PID:304
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"98⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock99⤵PID:2988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"100⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock101⤵PID:1588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"102⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock103⤵PID:2116
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"104⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock105⤵PID:2668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"106⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock107⤵PID:1156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"108⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock109⤵PID:2952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"110⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock111⤵PID:2780
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"112⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock113⤵PID:1532
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"114⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock115⤵PID:2276
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"116⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock117⤵PID:324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"118⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock119⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"120⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock121⤵PID:1964
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"122⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock123⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"124⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock125⤵PID:2148
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"126⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock127⤵PID:1480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"128⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock129⤵PID:1576
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"130⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock131⤵PID:1516
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"132⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock133⤵PID:864
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"134⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock135⤵PID:1060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"136⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock137⤵PID:1608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"138⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock139⤵PID:2828
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"140⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock141⤵PID:2980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"142⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock143⤵PID:1288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"144⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock145⤵PID:484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"146⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock147⤵PID:1520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"148⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock149⤵PID:1696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"150⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock151⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"152⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock153⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"154⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock155⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"156⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock157⤵PID:772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"158⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock159⤵PID:648
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"160⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock161⤵PID:788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"162⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock163⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"164⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock165⤵PID:772
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"166⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock167⤵PID:892
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"168⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock169⤵PID:872
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"170⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock171⤵PID:1804
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"172⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock173⤵PID:1792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"174⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock175⤵PID:2488
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"176⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock177⤵PID:2228
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"178⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock179⤵PID:2656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"180⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock181⤵PID:744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"182⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock183⤵PID:1260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"184⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock185⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"186⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock187⤵PID:1672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"188⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock189⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"190⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock191⤵PID:868
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"192⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock193⤵PID:2500
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"194⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock195⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"196⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock197⤵PID:1656
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"198⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock199⤵PID:1336
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"200⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock201⤵PID:2128
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"202⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock203⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"204⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock205⤵PID:2664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"206⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock207⤵PID:608
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"208⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock209⤵PID:1388
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"210⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock211⤵PID:2496
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"212⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock213⤵PID:2068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"214⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock215⤵PID:1860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"216⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock217⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"218⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock219⤵PID:2644
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"220⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock221⤵PID:668
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"222⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock223⤵PID:1904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"224⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock225⤵PID:2632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"226⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock227⤵PID:984
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"228⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock229⤵PID:2636
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"230⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock231⤵PID:2176
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"232⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock233⤵PID:2424
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"234⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock235⤵PID:880
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"236⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock237⤵PID:1748
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"238⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock239⤵PID:980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"240⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock241⤵PID:2272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"242⤵PID:2368