Analysis
-
max time kernel
73s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 04:39
Static task
static1
Behavioral task
behavioral1
Sample
bfddcea5454a7997305696541e6d6347.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bfddcea5454a7997305696541e6d6347.exe
Resource
win10v2004-20240226-en
General
-
Target
bfddcea5454a7997305696541e6d6347.exe
-
Size
286KB
-
MD5
bfddcea5454a7997305696541e6d6347
-
SHA1
2885d22411b1a0f5565e0542bb38c0a3cf7a0e4d
-
SHA256
6f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d
-
SHA512
2a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205
-
SSDEEP
6144:23MrONR1cNwPLvoqg0R2VhPefm0ToyugupkXHykED/m0eNGGs:o171c2obY7WDK3yh/n
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 40 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bfddcea5454a7997305696541e6d6347.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation agetlksyiey.exe -
Executes dropped EXE 40 IoCs
pid Process 1536 agetlksyiey.exe 1104 agetlksyiey.exe 4888 agetlksyiey.exe 3232 agetlksyiey.exe 4312 agetlksyiey.exe 1552 agetlksyiey.exe 1544 agetlksyiey.exe 2668 agetlksyiey.exe 2916 agetlksyiey.exe 1744 agetlksyiey.exe 3624 agetlksyiey.exe 2996 agetlksyiey.exe 760 agetlksyiey.exe 1668 agetlksyiey.exe 3152 agetlksyiey.exe 4620 agetlksyiey.exe 3544 agetlksyiey.exe 4996 agetlksyiey.exe 1540 agetlksyiey.exe 5068 agetlksyiey.exe 2916 agetlksyiey.exe 4460 agetlksyiey.exe 4988 agetlksyiey.exe 1968 agetlksyiey.exe 4596 agetlksyiey.exe 2224 agetlksyiey.exe 3168 agetlksyiey.exe 3644 agetlksyiey.exe 1968 agetlksyiey.exe 1448 agetlksyiey.exe 2184 agetlksyiey.exe 2532 agetlksyiey.exe 4056 agetlksyiey.exe 2984 agetlksyiey.exe 4528 agetlksyiey.exe 3820 agetlksyiey.exe 964 agetlksyiey.exe 4056 agetlksyiey.exe 1616 agetlksyiey.exe 1644 agetlksyiey.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe bfddcea5454a7997305696541e6d6347.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File created C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\psapi.lib agetlksyiey.exe File opened for modification C:\Windows\SysWOW64\agetlksyiey.exe agetlksyiey.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bfddcea5454a7997305696541e6d6347.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ agetlksyiey.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2340 bfddcea5454a7997305696541e6d6347.exe 2340 bfddcea5454a7997305696541e6d6347.exe 1536 agetlksyiey.exe 1536 agetlksyiey.exe 1104 agetlksyiey.exe 1104 agetlksyiey.exe 4888 agetlksyiey.exe 4888 agetlksyiey.exe 3232 agetlksyiey.exe 3232 agetlksyiey.exe 4312 agetlksyiey.exe 4312 agetlksyiey.exe 1552 agetlksyiey.exe 1552 agetlksyiey.exe 1544 agetlksyiey.exe 1544 agetlksyiey.exe 2668 agetlksyiey.exe 2668 agetlksyiey.exe 2916 agetlksyiey.exe 2916 agetlksyiey.exe 1744 agetlksyiey.exe 1744 agetlksyiey.exe 3624 agetlksyiey.exe 3624 agetlksyiey.exe 2996 agetlksyiey.exe 2996 agetlksyiey.exe 760 agetlksyiey.exe 760 agetlksyiey.exe 1668 agetlksyiey.exe 1668 agetlksyiey.exe 3152 agetlksyiey.exe 3152 agetlksyiey.exe 4620 agetlksyiey.exe 4620 agetlksyiey.exe 3544 agetlksyiey.exe 3544 agetlksyiey.exe 4996 agetlksyiey.exe 4996 agetlksyiey.exe 1540 agetlksyiey.exe 1540 agetlksyiey.exe 5068 agetlksyiey.exe 5068 agetlksyiey.exe 2916 agetlksyiey.exe 2916 agetlksyiey.exe 4460 agetlksyiey.exe 4460 agetlksyiey.exe 4988 agetlksyiey.exe 4988 agetlksyiey.exe 1968 agetlksyiey.exe 1968 agetlksyiey.exe 4596 agetlksyiey.exe 4596 agetlksyiey.exe 2224 agetlksyiey.exe 2224 agetlksyiey.exe 3168 agetlksyiey.exe 3168 agetlksyiey.exe 3644 agetlksyiey.exe 3644 agetlksyiey.exe 1968 agetlksyiey.exe 1968 agetlksyiey.exe 1448 agetlksyiey.exe 1448 agetlksyiey.exe 2184 agetlksyiey.exe 2184 agetlksyiey.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 1536 2340 bfddcea5454a7997305696541e6d6347.exe 102 PID 2340 wrote to memory of 1536 2340 bfddcea5454a7997305696541e6d6347.exe 102 PID 2340 wrote to memory of 1536 2340 bfddcea5454a7997305696541e6d6347.exe 102 PID 1536 wrote to memory of 1104 1536 agetlksyiey.exe 103 PID 1536 wrote to memory of 1104 1536 agetlksyiey.exe 103 PID 1536 wrote to memory of 1104 1536 agetlksyiey.exe 103 PID 1104 wrote to memory of 4888 1104 agetlksyiey.exe 104 PID 1104 wrote to memory of 4888 1104 agetlksyiey.exe 104 PID 1104 wrote to memory of 4888 1104 agetlksyiey.exe 104 PID 4888 wrote to memory of 3232 4888 agetlksyiey.exe 105 PID 4888 wrote to memory of 3232 4888 agetlksyiey.exe 105 PID 4888 wrote to memory of 3232 4888 agetlksyiey.exe 105 PID 3232 wrote to memory of 4312 3232 agetlksyiey.exe 106 PID 3232 wrote to memory of 4312 3232 agetlksyiey.exe 106 PID 3232 wrote to memory of 4312 3232 agetlksyiey.exe 106 PID 4312 wrote to memory of 1552 4312 agetlksyiey.exe 107 PID 4312 wrote to memory of 1552 4312 agetlksyiey.exe 107 PID 4312 wrote to memory of 1552 4312 agetlksyiey.exe 107 PID 1552 wrote to memory of 1544 1552 agetlksyiey.exe 108 PID 1552 wrote to memory of 1544 1552 agetlksyiey.exe 108 PID 1552 wrote to memory of 1544 1552 agetlksyiey.exe 108 PID 1544 wrote to memory of 2668 1544 agetlksyiey.exe 111 PID 1544 wrote to memory of 2668 1544 agetlksyiey.exe 111 PID 1544 wrote to memory of 2668 1544 agetlksyiey.exe 111 PID 2668 wrote to memory of 2916 2668 agetlksyiey.exe 129 PID 2668 wrote to memory of 2916 2668 agetlksyiey.exe 129 PID 2668 wrote to memory of 2916 2668 agetlksyiey.exe 129 PID 2916 wrote to memory of 1744 2916 agetlksyiey.exe 114 PID 2916 wrote to memory of 1744 2916 agetlksyiey.exe 114 PID 2916 wrote to memory of 1744 2916 agetlksyiey.exe 114 PID 1744 wrote to memory of 3624 1744 agetlksyiey.exe 115 PID 1744 wrote to memory of 3624 1744 agetlksyiey.exe 115 PID 1744 wrote to memory of 3624 1744 agetlksyiey.exe 115 PID 3624 wrote to memory of 2996 3624 agetlksyiey.exe 116 PID 3624 wrote to memory of 2996 3624 agetlksyiey.exe 116 PID 3624 wrote to memory of 2996 3624 agetlksyiey.exe 116 PID 2996 wrote to memory of 760 2996 agetlksyiey.exe 118 PID 2996 wrote to memory of 760 2996 agetlksyiey.exe 118 PID 2996 wrote to memory of 760 2996 agetlksyiey.exe 118 PID 760 wrote to memory of 1668 760 agetlksyiey.exe 119 PID 760 wrote to memory of 1668 760 agetlksyiey.exe 119 PID 760 wrote to memory of 1668 760 agetlksyiey.exe 119 PID 1668 wrote to memory of 3152 1668 agetlksyiey.exe 120 PID 1668 wrote to memory of 3152 1668 agetlksyiey.exe 120 PID 1668 wrote to memory of 3152 1668 agetlksyiey.exe 120 PID 3152 wrote to memory of 4620 3152 agetlksyiey.exe 122 PID 3152 wrote to memory of 4620 3152 agetlksyiey.exe 122 PID 3152 wrote to memory of 4620 3152 agetlksyiey.exe 122 PID 4620 wrote to memory of 3544 4620 agetlksyiey.exe 124 PID 4620 wrote to memory of 3544 4620 agetlksyiey.exe 124 PID 4620 wrote to memory of 3544 4620 agetlksyiey.exe 124 PID 3544 wrote to memory of 4996 3544 agetlksyiey.exe 125 PID 3544 wrote to memory of 4996 3544 agetlksyiey.exe 125 PID 3544 wrote to memory of 4996 3544 agetlksyiey.exe 125 PID 4996 wrote to memory of 1540 4996 agetlksyiey.exe 127 PID 4996 wrote to memory of 1540 4996 agetlksyiey.exe 127 PID 4996 wrote to memory of 1540 4996 agetlksyiey.exe 127 PID 1540 wrote to memory of 5068 1540 agetlksyiey.exe 128 PID 1540 wrote to memory of 5068 1540 agetlksyiey.exe 128 PID 1540 wrote to memory of 5068 1540 agetlksyiey.exe 128 PID 5068 wrote to memory of 2916 5068 agetlksyiey.exe 129 PID 5068 wrote to memory of 2916 5068 agetlksyiey.exe 129 PID 5068 wrote to memory of 2916 5068 agetlksyiey.exe 129 PID 2916 wrote to memory of 4460 2916 agetlksyiey.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe"C:\Users\Admin\AppData\Local\Temp\bfddcea5454a7997305696541e6d6347.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4988 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4596 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3168 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3644 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2532 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4056 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2984 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4528 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3820 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:4056 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:1616 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"42⤵PID:4764
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"43⤵PID:2768
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"44⤵PID:2984
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"45⤵PID:1448
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"46⤵PID:4832
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"47⤵PID:3484
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"48⤵PID:4608
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"49⤵PID:3820
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"50⤵PID:4124
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"51⤵PID:3152
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"52⤵PID:4068
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"53⤵PID:948
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"54⤵PID:4608
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"55⤵PID:1888
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"56⤵PID:1548
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"57⤵PID:3304
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"58⤵PID:1668
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"59⤵PID:3644
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"60⤵PID:4620
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"61⤵PID:3720
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"62⤵PID:4104
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"63⤵PID:3528
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"64⤵PID:2768
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"65⤵PID:3884
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"66⤵PID:3628
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"67⤵PID:1320
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"68⤵PID:4692
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"69⤵PID:3192
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"70⤵PID:4028
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"71⤵PID:3152
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"72⤵PID:468
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"73⤵PID:4312
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"74⤵PID:2016
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"75⤵PID:528
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"76⤵PID:4028
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"77⤵PID:3616
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"78⤵PID:3820
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"79⤵PID:2116
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"80⤵PID:4036
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"81⤵PID:2040
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"82⤵PID:4332
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"83⤵PID:3720
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"84⤵PID:4308
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"85⤵PID:1588
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"86⤵PID:764
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"87⤵PID:3168
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"88⤵PID:4712
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"89⤵PID:436
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"90⤵PID:1588
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"91⤵PID:4580
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"92⤵PID:464
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"93⤵PID:3624
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"94⤵PID:2208
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"95⤵PID:4404
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"96⤵PID:4644
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"97⤵PID:2168
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"98⤵PID:2920
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"99⤵PID:4872
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"100⤵PID:4968
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"101⤵PID:3436
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"102⤵PID:1616
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"103⤵PID:860
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"104⤵PID:2124
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"105⤵PID:1560
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"106⤵PID:184
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"107⤵PID:4872
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"108⤵PID:3556
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"109⤵PID:4588
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"110⤵PID:2768
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"111⤵PID:2356
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"112⤵PID:1548
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"113⤵PID:220
-
C:\Windows\SysWOW64\agetlksyiey.exe"C:\Windows\system32\agetlksyiey.exe"114⤵PID:2380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5bfddcea5454a7997305696541e6d6347
SHA12885d22411b1a0f5565e0542bb38c0a3cf7a0e4d
SHA2566f6f647a9bafb8dfd42593d4d77abdd05947bc6a49716b79fbbc1a51f293079d
SHA5122a404382475c49f150a30eb283811002da5ba848988d8c139a653f72b2bdb41878b32c885c6a5dcef6e0c9e36ed98d6edd7f5c6b6efbcd4fc7f79a2bf1b6a205
-
Filesize
19KB
MD5a5b1b1f7c2c51ff400d93ae63f484d96
SHA15f038003bf8851254ba577db5d8dfd69c1085c33
SHA25635b1d2d2bc5c531d49aa3550de5c19bd5f4ebe79c594c6f5000d6de28b2621bf
SHA51290c2145b39611bd1406c513dff16366a51e86e8831c34ab15f650e6620a75533e800db056dda2e7e176fac8b20cd0be76bc1725b45930b31595d4aac00da4eec