Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe
-
Size
15KB
-
MD5
d4974a781ecbc5e976d707eb62332c03
-
SHA1
913a8c25c2dd31d3ba5c45c2818dab7fa189a902
-
SHA256
4342ad06cc9b14e0c2c6de0edcd9d3af7ccdccc4b11552ba7152be45c80d549c
-
SHA512
59bb229acf3574b5ae797d5ec7cde8268af62cfbadbf41318a01a77249cd9f885da624092bf452f4408328877d8ff32bf9d214e807c71bb4bbc824cc7368ca72
-
SSDEEP
192:ycAwpYUPtg7XiOoAHfipMQPZ9lZdJrU+3dwQQkHbvghsw/3CXHGyU2s7S6bL:yzE4i0fYPZ/tUFQQkHblw/3iHGypqSy
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2408 agetlktz.exe 2172 agetlktz.exe 2700 agetlktz.exe 2712 agetlktz.exe 2720 agetlktz.exe 2624 agetlktz.exe 1676 agetlktz.exe 2448 agetlktz.exe 924 agetlktz.exe 1932 agetlktz.exe 2880 agetlktz.exe 2424 agetlktz.exe 1072 agetlktz.exe 2312 agetlktz.exe 1980 agetlktz.exe 1052 agetlktz.exe 2024 agetlktz.exe 1560 agetlktz.exe 900 agetlktz.exe 2988 agetlktz.exe 512 agetlktz.exe 544 agetlktz.exe 1284 agetlktz.exe 2296 agetlktz.exe 1596 agetlktz.exe 2408 agetlktz.exe 2240 agetlktz.exe 2980 agetlktz.exe 2856 agetlktz.exe 2688 agetlktz.exe 2568 agetlktz.exe 2528 agetlktz.exe 1948 agetlktz.exe 1664 agetlktz.exe 2292 agetlktz.exe 1900 agetlktz.exe 2912 agetlktz.exe 2372 agetlktz.exe 2896 agetlktz.exe 1152 agetlktz.exe 1060 agetlktz.exe 1944 agetlktz.exe 2000 agetlktz.exe 1052 agetlktz.exe 2412 agetlktz.exe 1560 agetlktz.exe 1116 agetlktz.exe 864 agetlktz.exe 2152 agetlktz.exe 544 agetlktz.exe 1284 agetlktz.exe 1608 agetlktz.exe 2800 agetlktz.exe 2676 agetlktz.exe 1444 agetlktz.exe 2120 agetlktz.exe 2620 agetlktz.exe 3064 agetlktz.exe 2624 agetlktz.exe 2456 agetlktz.exe 1144 agetlktz.exe 1904 agetlktz.exe 2864 agetlktz.exe 2924 agetlktz.exe -
Loads dropped DLL 64 IoCs
pid Process 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 2408 agetlktz.exe 2408 agetlktz.exe 2408 agetlktz.exe 2172 agetlktz.exe 2172 agetlktz.exe 2172 agetlktz.exe 2700 agetlktz.exe 2700 agetlktz.exe 2700 agetlktz.exe 2712 agetlktz.exe 2712 agetlktz.exe 2712 agetlktz.exe 2720 agetlktz.exe 2720 agetlktz.exe 2720 agetlktz.exe 2624 agetlktz.exe 2624 agetlktz.exe 2624 agetlktz.exe 1676 agetlktz.exe 1676 agetlktz.exe 1676 agetlktz.exe 2448 agetlktz.exe 2448 agetlktz.exe 2448 agetlktz.exe 924 agetlktz.exe 924 agetlktz.exe 924 agetlktz.exe 1932 agetlktz.exe 1932 agetlktz.exe 1932 agetlktz.exe 2880 agetlktz.exe 2880 agetlktz.exe 2880 agetlktz.exe 2424 agetlktz.exe 2424 agetlktz.exe 2424 agetlktz.exe 1072 agetlktz.exe 1072 agetlktz.exe 1072 agetlktz.exe 2312 agetlktz.exe 2312 agetlktz.exe 2312 agetlktz.exe 1980 agetlktz.exe 1980 agetlktz.exe 1980 agetlktz.exe 1052 agetlktz.exe 1052 agetlktz.exe 1052 agetlktz.exe 2024 agetlktz.exe 2024 agetlktz.exe 2024 agetlktz.exe 1560 agetlktz.exe 1560 agetlktz.exe 1560 agetlktz.exe 900 agetlktz.exe 900 agetlktz.exe 900 agetlktz.exe 2988 agetlktz.exe 2988 agetlktz.exe 2988 agetlktz.exe 512 agetlktz.exe 512 agetlktz.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File created C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe File opened for modification C:\Windows\SysWOW64\agetlktz.exe agetlktz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language agetlktz.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 2408 agetlktz.exe 2408 agetlktz.exe 2172 agetlktz.exe 2172 agetlktz.exe 2700 agetlktz.exe 2700 agetlktz.exe 2712 agetlktz.exe 2712 agetlktz.exe 2720 agetlktz.exe 2720 agetlktz.exe 2624 agetlktz.exe 2624 agetlktz.exe 1676 agetlktz.exe 1676 agetlktz.exe 2448 agetlktz.exe 2448 agetlktz.exe 924 agetlktz.exe 924 agetlktz.exe 1932 agetlktz.exe 1932 agetlktz.exe 2880 agetlktz.exe 2880 agetlktz.exe 2424 agetlktz.exe 2424 agetlktz.exe 1072 agetlktz.exe 1072 agetlktz.exe 2312 agetlktz.exe 2312 agetlktz.exe 1980 agetlktz.exe 1980 agetlktz.exe 1052 agetlktz.exe 1052 agetlktz.exe 2024 agetlktz.exe 2024 agetlktz.exe 1560 agetlktz.exe 1560 agetlktz.exe 900 agetlktz.exe 900 agetlktz.exe 2988 agetlktz.exe 2988 agetlktz.exe 512 agetlktz.exe 512 agetlktz.exe 544 agetlktz.exe 544 agetlktz.exe 1284 agetlktz.exe 1284 agetlktz.exe 2296 agetlktz.exe 2296 agetlktz.exe 1596 agetlktz.exe 1596 agetlktz.exe 2408 agetlktz.exe 2408 agetlktz.exe 2240 agetlktz.exe 2240 agetlktz.exe 2980 agetlktz.exe 2980 agetlktz.exe 2856 agetlktz.exe 2856 agetlktz.exe 2688 agetlktz.exe 2688 agetlktz.exe 2568 agetlktz.exe 2568 agetlktz.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2408 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2408 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2408 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2408 1804 d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe 30 PID 2408 wrote to memory of 2172 2408 agetlktz.exe 31 PID 2408 wrote to memory of 2172 2408 agetlktz.exe 31 PID 2408 wrote to memory of 2172 2408 agetlktz.exe 31 PID 2408 wrote to memory of 2172 2408 agetlktz.exe 31 PID 2172 wrote to memory of 2700 2172 agetlktz.exe 32 PID 2172 wrote to memory of 2700 2172 agetlktz.exe 32 PID 2172 wrote to memory of 2700 2172 agetlktz.exe 32 PID 2172 wrote to memory of 2700 2172 agetlktz.exe 32 PID 2700 wrote to memory of 2712 2700 agetlktz.exe 33 PID 2700 wrote to memory of 2712 2700 agetlktz.exe 33 PID 2700 wrote to memory of 2712 2700 agetlktz.exe 33 PID 2700 wrote to memory of 2712 2700 agetlktz.exe 33 PID 2712 wrote to memory of 2720 2712 agetlktz.exe 34 PID 2712 wrote to memory of 2720 2712 agetlktz.exe 34 PID 2712 wrote to memory of 2720 2712 agetlktz.exe 34 PID 2712 wrote to memory of 2720 2712 agetlktz.exe 34 PID 2720 wrote to memory of 2624 2720 agetlktz.exe 35 PID 2720 wrote to memory of 2624 2720 agetlktz.exe 35 PID 2720 wrote to memory of 2624 2720 agetlktz.exe 35 PID 2720 wrote to memory of 2624 2720 agetlktz.exe 35 PID 2624 wrote to memory of 1676 2624 agetlktz.exe 36 PID 2624 wrote to memory of 1676 2624 agetlktz.exe 36 PID 2624 wrote to memory of 1676 2624 agetlktz.exe 36 PID 2624 wrote to memory of 1676 2624 agetlktz.exe 36 PID 1676 wrote to memory of 2448 1676 agetlktz.exe 38 PID 1676 wrote to memory of 2448 1676 agetlktz.exe 38 PID 1676 wrote to memory of 2448 1676 agetlktz.exe 38 PID 1676 wrote to memory of 2448 1676 agetlktz.exe 38 PID 2448 wrote to memory of 924 2448 agetlktz.exe 39 PID 2448 wrote to memory of 924 2448 agetlktz.exe 39 PID 2448 wrote to memory of 924 2448 agetlktz.exe 39 PID 2448 wrote to memory of 924 2448 agetlktz.exe 39 PID 924 wrote to memory of 1932 924 agetlktz.exe 40 PID 924 wrote to memory of 1932 924 agetlktz.exe 40 PID 924 wrote to memory of 1932 924 agetlktz.exe 40 PID 924 wrote to memory of 1932 924 agetlktz.exe 40 PID 1932 wrote to memory of 2880 1932 agetlktz.exe 41 PID 1932 wrote to memory of 2880 1932 agetlktz.exe 41 PID 1932 wrote to memory of 2880 1932 agetlktz.exe 41 PID 1932 wrote to memory of 2880 1932 agetlktz.exe 41 PID 2880 wrote to memory of 2424 2880 agetlktz.exe 42 PID 2880 wrote to memory of 2424 2880 agetlktz.exe 42 PID 2880 wrote to memory of 2424 2880 agetlktz.exe 42 PID 2880 wrote to memory of 2424 2880 agetlktz.exe 42 PID 2424 wrote to memory of 1072 2424 agetlktz.exe 43 PID 2424 wrote to memory of 1072 2424 agetlktz.exe 43 PID 2424 wrote to memory of 1072 2424 agetlktz.exe 43 PID 2424 wrote to memory of 1072 2424 agetlktz.exe 43 PID 1072 wrote to memory of 2312 1072 agetlktz.exe 44 PID 1072 wrote to memory of 2312 1072 agetlktz.exe 44 PID 1072 wrote to memory of 2312 1072 agetlktz.exe 44 PID 1072 wrote to memory of 2312 1072 agetlktz.exe 44 PID 2312 wrote to memory of 1980 2312 agetlktz.exe 45 PID 2312 wrote to memory of 1980 2312 agetlktz.exe 45 PID 2312 wrote to memory of 1980 2312 agetlktz.exe 45 PID 2312 wrote to memory of 1980 2312 agetlktz.exe 45 PID 1980 wrote to memory of 1052 1980 agetlktz.exe 74 PID 1980 wrote to memory of 1052 1980 agetlktz.exe 74 PID 1980 wrote to memory of 1052 1980 agetlktz.exe 74 PID 1980 wrote to memory of 1052 1980 agetlktz.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d4974a781ecbc5e976d707eb62332c03_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:512 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2292 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1152 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"66⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"67⤵
- Drops file in System32 directory
PID:1328 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"69⤵
- Drops file in System32 directory
PID:696 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"74⤵
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"75⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"76⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"77⤵PID:2152
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"78⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"79⤵PID:2644
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"80⤵PID:2760
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"81⤵PID:2748
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"82⤵PID:2640
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"83⤵PID:1444
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"84⤵PID:2120
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"85⤵PID:2620
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"86⤵PID:3064
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"87⤵PID:1376
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"88⤵PID:1620
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"89⤵PID:924
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"90⤵PID:1896
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"91⤵PID:1960
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"92⤵PID:2912
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"93⤵PID:2192
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"94⤵PID:1328
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"95⤵PID:2920
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"96⤵PID:696
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"97⤵PID:1796
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"98⤵PID:1568
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"99⤵PID:2024
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"100⤵PID:2136
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"101⤵PID:2512
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"102⤵PID:2260
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"103⤵PID:1584
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"104⤵PID:1680
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"105⤵PID:2176
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"106⤵PID:2644
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"107⤵PID:2760
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"108⤵PID:2980
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"109⤵PID:2604
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"110⤵PID:2720
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"111⤵PID:2284
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"112⤵PID:2476
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"113⤵PID:1128
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"114⤵PID:1908
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"115⤵PID:1876
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"116⤵PID:1880
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"117⤵PID:1016
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"118⤵PID:2012
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"119⤵PID:1772
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"120⤵PID:1752
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"121⤵PID:2312
-
C:\Windows\SysWOW64\agetlktz.exe"C:\Windows\system32\agetlktz.exe"122⤵PID:2020
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-