Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2024 03:58
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe
-
Size
186KB
-
MD5
f42ce0e64a3d2f7354f003349e7cdf8c
-
SHA1
4c7ee52a1e9b7aabecf7574975a9d16823a4adbd
-
SHA256
a2b770179bb3c0ca242e748870a62017e2fbfd4a669a27cae94f7fe3a2357bc3
-
SHA512
704b352efd4fcaf4eed028b773928f085f2b643cba10ab5e92e999eecd3625b92ad0befd7a71322c949c681f4bfd607d8c8f1e1bd5f0a8701677c290443d0c71
-
SSDEEP
3072:VanwoG/J9JL1t2TwgplBFi7NRux1/O7cp7yVL36XaurGJO1euGi939jIhl:Wwf/vJL1E3nBFFH/O7cp7qbgaXQ1euGJ
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" -
Renames multiple (75) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AWEQYEgU.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation AWEQYEgU.exe -
Executes dropped EXE 2 IoCs
Processes:
RYwEgYMU.exeAWEQYEgU.exepid process 2924 RYwEgYMU.exe 4540 AWEQYEgU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
RYwEgYMU.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeAWEQYEgU.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RYwEgYMU.exe = "C:\\Users\\Admin\\SYIswwYo\\RYwEgYMU.exe" RYwEgYMU.exe Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RYwEgYMU.exe = "C:\\Users\\Admin\\SYIswwYo\\RYwEgYMU.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AWEQYEgU.exe = "C:\\ProgramData\\kSYAwIMM\\AWEQYEgU.exe" 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AWEQYEgU.exe = "C:\\ProgramData\\kSYAwIMM\\AWEQYEgU.exe" AWEQYEgU.exe -
Drops file in System32 directory 2 IoCs
Processes:
AWEQYEgU.exedescription ioc process File created C:\Windows\SysWOW64\shell32.dll.exe AWEQYEgU.exe File opened for modification C:\Windows\SysWOW64\shell32.dll.exe AWEQYEgU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 3972 reg.exe 4644 reg.exe 4204 reg.exe 2916 2936 reg.exe 1624 2276 reg.exe 984 reg.exe 2104 reg.exe 4520 reg.exe 2596 reg.exe 4660 reg.exe 4724 reg.exe 3740 2280 reg.exe 4736 reg.exe 3664 4832 reg.exe 2588 reg.exe 2188 reg.exe 4664 reg.exe 3568 reg.exe 1852 reg.exe 1504 reg.exe 4148 reg.exe 4148 4008 3220 reg.exe 3728 reg.exe 3724 reg.exe 4172 reg.exe 1572 reg.exe 3552 1404 reg.exe 3108 reg.exe 3740 reg.exe 4200 reg.exe 4224 reg.exe 2516 876 reg.exe 4468 reg.exe 5084 reg.exe 2916 reg.exe 1516 reg.exe 2580 reg.exe 4116 reg.exe 3732 reg.exe 3800 4136 3672 reg.exe 2276 reg.exe 3828 4636 reg.exe 2540 reg.exe 4148 reg.exe 624 reg.exe 2828 reg.exe 4468 reg.exe 1768 reg.exe 1936 reg.exe 3216 reg.exe 3800 1132 3172 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exepid process 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3196 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3196 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3196 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3196 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4048 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4048 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4048 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4048 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2036 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2036 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2036 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2036 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2168 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2168 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2168 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2168 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3628 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3628 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3628 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3628 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3684 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3684 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3684 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 3684 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4788 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4788 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4788 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4788 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2644 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2644 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2644 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2644 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2696 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2696 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2696 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 2696 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4472 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4472 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4472 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4472 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4140 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4140 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4140 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe 4140 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AWEQYEgU.exepid process 4540 AWEQYEgU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
AWEQYEgU.exepid process 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe 4540 AWEQYEgU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.execmd.execmd.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.execmd.execmd.exe2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.execmd.exedescription pid process target process PID 4180 wrote to memory of 2924 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe RYwEgYMU.exe PID 4180 wrote to memory of 2924 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe RYwEgYMU.exe PID 4180 wrote to memory of 2924 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe RYwEgYMU.exe PID 4180 wrote to memory of 4540 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe AWEQYEgU.exe PID 4180 wrote to memory of 4540 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe AWEQYEgU.exe PID 4180 wrote to memory of 4540 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe AWEQYEgU.exe PID 4180 wrote to memory of 2772 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 4180 wrote to memory of 2772 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 4180 wrote to memory of 2772 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 4180 wrote to memory of 3172 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 3172 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 3172 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2064 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2064 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2064 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2020 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2020 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 2020 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 4180 wrote to memory of 1912 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 4180 wrote to memory of 1912 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 4180 wrote to memory of 1912 4180 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2772 wrote to memory of 2828 2772 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2772 wrote to memory of 2828 2772 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 2772 wrote to memory of 2828 2772 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 1912 wrote to memory of 2036 1912 cmd.exe cscript.exe PID 1912 wrote to memory of 2036 1912 cmd.exe cscript.exe PID 1912 wrote to memory of 2036 1912 cmd.exe cscript.exe PID 2828 wrote to memory of 1744 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2828 wrote to memory of 1744 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2828 wrote to memory of 1744 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2828 wrote to memory of 5052 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 5052 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 5052 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1344 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1344 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1344 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1060 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1060 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 1060 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 2828 wrote to memory of 3212 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2828 wrote to memory of 3212 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 2828 wrote to memory of 3212 2828 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 1744 wrote to memory of 3512 1744 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 1744 wrote to memory of 3512 1744 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 1744 wrote to memory of 3512 1744 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 3212 wrote to memory of 2000 3212 cmd.exe cscript.exe PID 3212 wrote to memory of 2000 3212 cmd.exe cscript.exe PID 3212 wrote to memory of 2000 3212 cmd.exe cscript.exe PID 3512 wrote to memory of 3568 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 3512 wrote to memory of 3568 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 3512 wrote to memory of 3568 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe PID 3568 wrote to memory of 3196 3568 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 3568 wrote to memory of 3196 3568 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 3568 wrote to memory of 3196 3568 cmd.exe 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe PID 3512 wrote to memory of 4112 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 4112 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 4112 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 1576 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 1576 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 1576 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 2252 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 2252 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 2252 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe reg.exe PID 3512 wrote to memory of 4728 3512 2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\SYIswwYo\RYwEgYMU.exe"C:\Users\Admin\SYIswwYo\RYwEgYMU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2924 -
C:\ProgramData\kSYAwIMM\AWEQYEgU.exe"C:\ProgramData\kSYAwIMM\AWEQYEgU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"2⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"4⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"6⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock7⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"8⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock9⤵
- Suspicious behavior: EnumeratesProcesses
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"10⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"12⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock13⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"14⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock15⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"16⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock17⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"18⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock19⤵
- Suspicious behavior: EnumeratesProcesses
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"20⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock21⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"22⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"24⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"26⤵PID:1996
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV127⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock27⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"28⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock29⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"30⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock31⤵
- Suspicious behavior: EnumeratesProcesses
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"32⤵PID:3308
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock33⤵PID:2668
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"34⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock35⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"36⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock37⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"38⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock39⤵PID:1588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"40⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock41⤵PID:1084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"42⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock43⤵PID:3196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"44⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock45⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"46⤵PID:1936
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock47⤵PID:512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"48⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock49⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"50⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock51⤵PID:4508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"52⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock53⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"54⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock55⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"56⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock57⤵PID:4660
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"58⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock59⤵PID:3740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"60⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock61⤵PID:980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"62⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock63⤵PID:332
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"64⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock65⤵PID:644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"66⤵PID:624
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV167⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock67⤵PID:2764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"68⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock69⤵PID:2592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"70⤵PID:4832
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock71⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"72⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock73⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"74⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock75⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"76⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock77⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"78⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock79⤵PID:4468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"80⤵PID:2188
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock81⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"82⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock83⤵PID:4068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"84⤵PID:2904
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV185⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock85⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"86⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock87⤵PID:876
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"88⤵PID:4736
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock89⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"90⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock91⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"92⤵PID:1568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV193⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock93⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"94⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock95⤵PID:1744
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"96⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock97⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"98⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock99⤵PID:3496
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"100⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock101⤵PID:3916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"102⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock103⤵PID:4572
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"104⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock105⤵PID:4528
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"106⤵PID:672
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock107⤵PID:1160
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"108⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock109⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"110⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock111⤵PID:116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"112⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock113⤵PID:872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"114⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock115⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"116⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock117⤵PID:2272
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"118⤵PID:4000
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1119⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock119⤵PID:3084
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"120⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock121⤵PID:940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"122⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock123⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"124⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock125⤵PID:5064
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"126⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock127⤵PID:3944
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"128⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock129⤵PID:1080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"130⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock131⤵PID:4888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"132⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock133⤵PID:4520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"134⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock135⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"136⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock137⤵PID:4200
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"138⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock139⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"140⤵PID:1768
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1141⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock141⤵PID:1996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"142⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock143⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"144⤵PID:3216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1145⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock145⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"146⤵PID:1860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1147⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock147⤵PID:4264
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"148⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock149⤵PID:2520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"150⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock151⤵PID:2268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"152⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock153⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"154⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock155⤵PID:3444
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"156⤵PID:2124
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1157⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock157⤵PID:1612
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"158⤵PID:3800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1159⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock159⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"160⤵PID:4832
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1161⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock161⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"162⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock163⤵PID:2844
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"164⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock165⤵PID:4140
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"166⤵PID:1572
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1167⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock167⤵PID:3504
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"168⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock169⤵PID:3508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"170⤵PID:3744
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock171⤵PID:2180
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"172⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock173⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"174⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock175⤵PID:1920
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"176⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock177⤵PID:4280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"178⤵PID:4224
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1179⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock179⤵PID:4492
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"180⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock181⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"182⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock183⤵PID:516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"184⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock185⤵PID:2188
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"186⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock187⤵PID:4112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"188⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock189⤵PID:4544
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"190⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock191⤵PID:4472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"192⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock193⤵PID:3580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"194⤵PID:3740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock195⤵PID:2764
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"196⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock197⤵PID:112
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"198⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock199⤵PID:2648
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"200⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock201⤵PID:1468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"202⤵PID:2816
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1203⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock203⤵PID:3476
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"204⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock205⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"206⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock207⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"208⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock209⤵PID:2600
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"210⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock211⤵PID:1244
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"212⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock213⤵PID:4184
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"214⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock215⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"216⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock217⤵PID:3540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"218⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock219⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"220⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock221⤵PID:2580
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"222⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock223⤵PID:2816
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"224⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock225⤵PID:968
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"226⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock227⤵PID:5052
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"228⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock229⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"230⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock231⤵PID:2396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"232⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock233⤵PID:5036
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"234⤵PID:5052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1235⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock235⤵PID:4664
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"236⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock237⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"238⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock239⤵PID:1172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"240⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock.exeC:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock241⤵PID:4760
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\2024-05-26_f42ce0e64a3d2f7354f003349e7cdf8c_virlock"242⤵PID:1244