Analysis
-
max time kernel
4s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 22:37
Static task
static1
Behavioral task
behavioral1
Sample
05d27d3b8ef3f0e6b720b48a4ac95197.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d27d3b8ef3f0e6b720b48a4ac95197.exe
Resource
win10v2004-20231215-en
General
-
Target
05d27d3b8ef3f0e6b720b48a4ac95197.exe
-
Size
60KB
-
MD5
05d27d3b8ef3f0e6b720b48a4ac95197
-
SHA1
1cd1bf3183db924a4199329411009ce7d008a4b8
-
SHA256
9a158e093959105e381fe82ace28d4b85a67334395aabb85ad1bf3cd3b2dcf26
-
SHA512
a3d23dc1835cb46cb84cf7b6541da919a1a70b93fb2395404a34a8ee90302c27728ef3bbcd749a879f484e302ecedd350a9afe006ac74212766db94376be4d77
-
SSDEEP
768:dMVOQl0KWwJ917vmdox7CflsQSsgUV9d+6DAOESj6Zz6ZjkfZa8g0FO:iqK9JWdox7C9sQ59d1EOERO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 23 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation agetlkeyls.exe -
Executes dropped EXE 22 IoCs
pid Process 3808 agetlkeyls.exe 5080 agetlkeyls.exe 392 agetlkeyls.exe 4216 agetlkeyls.exe 2156 agetlkeyls.exe 4968 agetlkeyls.exe 3588 agetlkeyls.exe 4924 agetlkeyls.exe 2004 agetlkeyls.exe 4996 agetlkeyls.exe 3844 agetlkeyls.exe 4292 agetlkeyls.exe 768 agetlkeyls.exe 3036 agetlkeyls.exe 456 agetlkeyls.exe 2544 agetlkeyls.exe 4652 agetlkeyls.exe 2984 agetlkeyls.exe 3176 agetlkeyls.exe 2492 agetlkeyls.exe 5056 agetlkeyls.exe 1612 agetlkeyls.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\psapi.lib agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File created C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe File opened for modification C:\Windows\SysWOW64\agetlkeyls.exe agetlkeyls.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlkeyls.exe -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 4116 agetlkeyls.exe 4116 agetlkeyls.exe 3808 agetlkeyls.exe 3808 agetlkeyls.exe 5080 agetlkeyls.exe 5080 agetlkeyls.exe 392 agetlkeyls.exe 392 agetlkeyls.exe 4216 agetlkeyls.exe 4216 agetlkeyls.exe 2156 agetlkeyls.exe 2156 agetlkeyls.exe 4968 agetlkeyls.exe 4968 agetlkeyls.exe 3588 agetlkeyls.exe 3588 agetlkeyls.exe 4924 agetlkeyls.exe 4924 agetlkeyls.exe 2004 agetlkeyls.exe 2004 agetlkeyls.exe 4996 agetlkeyls.exe 4996 agetlkeyls.exe 3844 agetlkeyls.exe 3844 agetlkeyls.exe 4292 agetlkeyls.exe 4292 agetlkeyls.exe 768 agetlkeyls.exe 768 agetlkeyls.exe 3036 agetlkeyls.exe 3036 agetlkeyls.exe 456 agetlkeyls.exe 456 agetlkeyls.exe 2544 agetlkeyls.exe 2544 agetlkeyls.exe 4652 agetlkeyls.exe 4652 agetlkeyls.exe 2984 agetlkeyls.exe 2984 agetlkeyls.exe 3176 agetlkeyls.exe 3176 agetlkeyls.exe 2492 agetlkeyls.exe 2492 agetlkeyls.exe 5056 agetlkeyls.exe 5056 agetlkeyls.exe 1612 agetlkeyls.exe 1612 agetlkeyls.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4116 wrote to memory of 3808 4116 agetlkeyls.exe 775 PID 4116 wrote to memory of 3808 4116 agetlkeyls.exe 775 PID 4116 wrote to memory of 3808 4116 agetlkeyls.exe 775 PID 3808 wrote to memory of 5080 3808 agetlkeyls.exe 512 PID 3808 wrote to memory of 5080 3808 agetlkeyls.exe 512 PID 3808 wrote to memory of 5080 3808 agetlkeyls.exe 512 PID 5080 wrote to memory of 392 5080 agetlkeyls.exe 432 PID 5080 wrote to memory of 392 5080 agetlkeyls.exe 432 PID 5080 wrote to memory of 392 5080 agetlkeyls.exe 432 PID 392 wrote to memory of 4216 392 agetlkeyls.exe 812 PID 392 wrote to memory of 4216 392 agetlkeyls.exe 812 PID 392 wrote to memory of 4216 392 agetlkeyls.exe 812 PID 4216 wrote to memory of 2156 4216 agetlkeyls.exe 677 PID 4216 wrote to memory of 2156 4216 agetlkeyls.exe 677 PID 4216 wrote to memory of 2156 4216 agetlkeyls.exe 677 PID 2156 wrote to memory of 4968 2156 agetlkeyls.exe 450 PID 2156 wrote to memory of 4968 2156 agetlkeyls.exe 450 PID 2156 wrote to memory of 4968 2156 agetlkeyls.exe 450 PID 4968 wrote to memory of 3588 4968 agetlkeyls.exe 711 PID 4968 wrote to memory of 3588 4968 agetlkeyls.exe 711 PID 4968 wrote to memory of 3588 4968 agetlkeyls.exe 711 PID 3588 wrote to memory of 4924 3588 agetlkeyls.exe 788 PID 3588 wrote to memory of 4924 3588 agetlkeyls.exe 788 PID 3588 wrote to memory of 4924 3588 agetlkeyls.exe 788 PID 4924 wrote to memory of 2004 4924 agetlkeyls.exe 809 PID 4924 wrote to memory of 2004 4924 agetlkeyls.exe 809 PID 4924 wrote to memory of 2004 4924 agetlkeyls.exe 809 PID 2004 wrote to memory of 4996 2004 agetlkeyls.exe 38 PID 2004 wrote to memory of 4996 2004 agetlkeyls.exe 38 PID 2004 wrote to memory of 4996 2004 agetlkeyls.exe 38 PID 4996 wrote to memory of 3844 4996 agetlkeyls.exe 65 PID 4996 wrote to memory of 3844 4996 agetlkeyls.exe 65 PID 4996 wrote to memory of 3844 4996 agetlkeyls.exe 65 PID 3844 wrote to memory of 4292 3844 agetlkeyls.exe 757 PID 3844 wrote to memory of 4292 3844 agetlkeyls.exe 757 PID 3844 wrote to memory of 4292 3844 agetlkeyls.exe 757 PID 4292 wrote to memory of 768 4292 agetlkeyls.exe 794 PID 4292 wrote to memory of 768 4292 agetlkeyls.exe 794 PID 4292 wrote to memory of 768 4292 agetlkeyls.exe 794 PID 768 wrote to memory of 3036 768 agetlkeyls.exe 56 PID 768 wrote to memory of 3036 768 agetlkeyls.exe 56 PID 768 wrote to memory of 3036 768 agetlkeyls.exe 56 PID 3036 wrote to memory of 456 3036 agetlkeyls.exe 54 PID 3036 wrote to memory of 456 3036 agetlkeyls.exe 54 PID 3036 wrote to memory of 456 3036 agetlkeyls.exe 54 PID 456 wrote to memory of 2544 456 agetlkeyls.exe 43 PID 456 wrote to memory of 2544 456 agetlkeyls.exe 43 PID 456 wrote to memory of 2544 456 agetlkeyls.exe 43 PID 2544 wrote to memory of 4652 2544 agetlkeyls.exe 186 PID 2544 wrote to memory of 4652 2544 agetlkeyls.exe 186 PID 2544 wrote to memory of 4652 2544 agetlkeyls.exe 186 PID 4652 wrote to memory of 2984 4652 agetlkeyls.exe 728 PID 4652 wrote to memory of 2984 4652 agetlkeyls.exe 728 PID 4652 wrote to memory of 2984 4652 agetlkeyls.exe 728 PID 2984 wrote to memory of 3176 2984 agetlkeyls.exe 45 PID 2984 wrote to memory of 3176 2984 agetlkeyls.exe 45 PID 2984 wrote to memory of 3176 2984 agetlkeyls.exe 45 PID 3176 wrote to memory of 2492 3176 agetlkeyls.exe 46 PID 3176 wrote to memory of 2492 3176 agetlkeyls.exe 46 PID 3176 wrote to memory of 2492 3176 agetlkeyls.exe 46 PID 2492 wrote to memory of 5056 2492 agetlkeyls.exe 924 PID 2492 wrote to memory of 5056 2492 agetlkeyls.exe 924 PID 2492 wrote to memory of 5056 2492 agetlkeyls.exe 924 PID 5056 wrote to memory of 1612 5056 agetlkeyls.exe 689
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d27d3b8ef3f0e6b720b48a4ac95197.exe"C:\Users\Admin\AppData\Local\Temp\05d27d3b8ef3f0e6b720b48a4ac95197.exe"1⤵PID:4116
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵PID:3808
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"3⤵PID:5080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"4⤵PID:392
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"5⤵PID:4216
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"6⤵PID:2156
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"7⤵PID:4968
-
-
-
-
-
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵PID:3588
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵PID:4924
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵PID:2004
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"3⤵PID:3844
-
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵PID:4292
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵PID:768
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036
-
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵PID:4652
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵PID:2984
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"4⤵PID:5056
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"5⤵PID:1612
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"6⤵PID:4812
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"7⤵PID:3440
-
-
-
-
-
-
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"1⤵PID:1144
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"2⤵PID:3472
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"3⤵PID:4080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"4⤵PID:1624
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"5⤵PID:1204
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"6⤵PID:1248
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"8⤵PID:3216
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"9⤵PID:4936
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"10⤵PID:4456
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"11⤵PID:1896
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"12⤵PID:536
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"13⤵PID:4300
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"14⤵PID:2324
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"15⤵PID:4960
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"16⤵PID:4676
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"17⤵PID:4468
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"18⤵PID:1728
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"19⤵PID:4988
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"20⤵PID:1612
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"21⤵PID:1704
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"22⤵PID:4604
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"23⤵PID:4832
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"24⤵PID:644
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"25⤵PID:4340
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"26⤵PID:4424
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"27⤵PID:2256
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"28⤵PID:1576
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"29⤵PID:5008
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"30⤵PID:3216
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"31⤵PID:1080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"32⤵PID:816
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"33⤵PID:1032
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"34⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4116 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"35⤵PID:1816
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"36⤵PID:2808
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"37⤵PID:2356
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"38⤵PID:3372
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"39⤵PID:2252
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"40⤵PID:2080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"41⤵PID:1612
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"42⤵PID:1808
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"43⤵PID:4388
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"44⤵PID:2484
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"45⤵PID:232
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"46⤵PID:212
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"47⤵PID:1128
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"48⤵PID:4508
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"49⤵PID:3136
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"50⤵PID:4928
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"51⤵PID:5068
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"52⤵PID:3904
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"53⤵PID:2488
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"54⤵PID:716
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"55⤵PID:2704
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"56⤵PID:2252
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"57⤵PID:2080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"58⤵PID:1612
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"59⤵PID:1808
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"60⤵PID:5096
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"61⤵PID:4876
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"62⤵PID:3780
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"63⤵PID:4484
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"64⤵PID:560
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"66⤵PID:4584
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"67⤵PID:1816
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"68⤵PID:3904
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"69⤵PID:2488
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"70⤵PID:716
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"71⤵PID:2704
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"72⤵PID:2252
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"73⤵PID:2080
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"74⤵PID:1612
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"75⤵PID:4924
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"76⤵PID:3936
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"77⤵PID:3216
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"78⤵PID:3044
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"79⤵PID:1048
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"80⤵PID:2324
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"81⤵PID:1772
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"82⤵PID:472
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"83⤵PID:316
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"84⤵PID:60
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"85⤵PID:4988
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"86⤵PID:1704
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"87⤵PID:2796
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"88⤵PID:3472
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"89⤵PID:3564
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"90⤵PID:5096
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"91⤵PID:4640
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"92⤵PID:540
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"93⤵PID:4396
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"94⤵PID:2920
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"95⤵PID:4040
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"96⤵PID:3192
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"97⤵PID:2216
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"98⤵PID:4160
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"99⤵PID:2488
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"100⤵PID:3972
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"101⤵PID:4992
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"102⤵PID:2464
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"103⤵PID:4196
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"104⤵PID:3228
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"105⤵PID:4808
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"106⤵PID:2248
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"107⤵PID:3464
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"108⤵PID:4840
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"109⤵PID:4308
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"110⤵PID:688
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"111⤵PID:5068
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"112⤵PID:4376
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"113⤵PID:3416
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"114⤵PID:4156
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"115⤵PID:4084
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"116⤵PID:1976
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"117⤵PID:4660
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"118⤵PID:4220
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"119⤵PID:3048
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"120⤵PID:8
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"121⤵PID:2820
-
C:\Windows\SysWOW64\agetlkeyls.exe"C:\Windows\system32\agetlkeyls.exe"122⤵PID:1080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-