Analysis
-
max time kernel
36s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-02-2025 18:07
Behavioral task
behavioral1
Sample
JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe
-
Size
1.8MB
-
MD5
ae06a4d1e5342c6ace7587b0de04d4df
-
SHA1
fb25a9016f23a64285808a7ce6eeee6ac5a280da
-
SHA256
440696d0079d2137a5c1236279c2b2298167051c27a59325fddf0f4f56f7b1b2
-
SHA512
3758212e9ff2db500a521ecdeae86a15269ec557bd2a752477a9054db0ef79d2b46241f07217ae7e4313af2a11f1cac148cd779efc22964a9ce47620dbe46c04
-
SSDEEP
24576:5o1dv2igD/Ro9r/wgR+j++SMT3UAubmitrZVx4tKCXfC2b7t4uc+UxaqukBWQg:5NmJ/1TtsUAqz4VK2P2Q4aqHfg
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 2 IoCs
resource yara_rule behavioral1/files/0x00060000000173fb-31.dat family_ardamax behavioral1/files/0x000600000001748f-64.dat family_ardamax -
Executes dropped EXE 64 IoCs
pid Process 2472 KeyHack.exe 2904 HSGA.exe 2908 KeyHack.exe 2620 HSGA.exe 2684 KeyHack.exe 2864 HSGA.exe 1272 KeyHack.exe 2884 HSGA.exe 1960 KeyHack.exe 1864 HSGA.exe 1372 KeyHack.exe 1980 HSGA.exe 1608 KeyHack.exe 2268 HSGA.exe 1672 KeyHack.exe 2220 HSGA.exe 1392 KeyHack.exe 1384 HSGA.exe 960 KeyHack.exe 2516 HSGA.exe 1788 KeyHack.exe 1224 HSGA.exe 1764 KeyHack.exe 1576 HSGA.exe 1712 KeyHack.exe 2068 HSGA.exe 2820 KeyHack.exe 1588 HSGA.exe 2240 KeyHack.exe 2796 HSGA.exe 2672 KeyHack.exe 1796 HSGA.exe 2772 KeyHack.exe 2460 HSGA.exe 2340 KeyHack.exe 2156 HSGA.exe 2728 KeyHack.exe 2980 HSGA.exe 3036 KeyHack.exe 2836 HSGA.exe 1808 KeyHack.exe 1832 HSGA.exe 1232 KeyHack.exe 2552 HSGA.exe 2140 KeyHack.exe 2144 HSGA.exe 724 KeyHack.exe 1760 HSGA.exe 2268 KeyHack.exe 1756 HSGA.exe 1692 KeyHack.exe 2468 HSGA.exe 1700 KeyHack.exe 2272 HSGA.exe 2360 KeyHack.exe 896 HSGA.exe 1768 KeyHack.exe 3068 HSGA.exe 1600 KeyHack.exe 2408 HSGA.exe 2068 KeyHack.exe 2700 HSGA.exe 2912 KeyHack.exe 2872 HSGA.exe -
Loads dropped DLL 64 IoCs
pid Process 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 2472 KeyHack.exe 2472 KeyHack.exe 2472 KeyHack.exe 2472 KeyHack.exe 2908 KeyHack.exe 2908 KeyHack.exe 2908 KeyHack.exe 2908 KeyHack.exe 2684 KeyHack.exe 2684 KeyHack.exe 2904 HSGA.exe 2684 KeyHack.exe 2684 KeyHack.exe 2864 HSGA.exe 2904 HSGA.exe 2712 NOTEPAD.EXE 2712 NOTEPAD.EXE 2684 KeyHack.exe 2684 KeyHack.exe 1272 KeyHack.exe 1272 KeyHack.exe 1272 KeyHack.exe 2884 HSGA.exe 2884 HSGA.exe 1272 KeyHack.exe 1272 KeyHack.exe 1272 KeyHack.exe 1960 KeyHack.exe 1960 KeyHack.exe 1960 KeyHack.exe 1864 HSGA.exe 1864 HSGA.exe 1960 KeyHack.exe 1960 KeyHack.exe 1960 KeyHack.exe 1372 KeyHack.exe 1372 KeyHack.exe 1372 KeyHack.exe 1980 HSGA.exe 1980 HSGA.exe 1372 KeyHack.exe 1372 KeyHack.exe 1372 KeyHack.exe 1608 KeyHack.exe 1608 KeyHack.exe 1608 KeyHack.exe 1608 KeyHack.exe 2268 HSGA.exe 2268 HSGA.exe 1672 KeyHack.exe 1672 KeyHack.exe 1672 KeyHack.exe 2220 HSGA.exe 2220 HSGA.exe 1672 KeyHack.exe 1672 KeyHack.exe 1672 KeyHack.exe 1392 KeyHack.exe 1392 KeyHack.exe 1392 KeyHack.exe 1384 HSGA.exe 1392 KeyHack.exe -
resource yara_rule behavioral1/memory/2156-25-0x0000000000400000-0x0000000000525000-memory.dmp themida -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HSGA Agent = "C:\\Windows\\SysWOW64\\28463\\HSGA.exe" HSGA.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463 HSGA.exe File created C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463 HSGA.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463 HSGA.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\AKV.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.007 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.exe KeyHack.exe File created C:\Windows\SysWOW64\28463\HSGA.006 KeyHack.exe File opened for modification C:\Windows\SysWOW64\28463\HSGA.001 KeyHack.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KeyHack.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSGA.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2712 NOTEPAD.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2904 HSGA.exe Token: SeIncBasePriorityPrivilege 2904 HSGA.exe Token: 33 2884 HSGA.exe Token: SeIncBasePriorityPrivilege 2884 HSGA.exe Token: 33 1864 HSGA.exe Token: SeIncBasePriorityPrivilege 1864 HSGA.exe Token: 33 1980 HSGA.exe Token: SeIncBasePriorityPrivilege 1980 HSGA.exe Token: 33 2268 HSGA.exe Token: SeIncBasePriorityPrivilege 2268 HSGA.exe Token: 33 2220 HSGA.exe Token: SeIncBasePriorityPrivilege 2220 HSGA.exe Token: 33 1384 HSGA.exe Token: SeIncBasePriorityPrivilege 1384 HSGA.exe Token: 33 2516 HSGA.exe Token: SeIncBasePriorityPrivilege 2516 HSGA.exe Token: 33 1224 HSGA.exe Token: SeIncBasePriorityPrivilege 1224 HSGA.exe Token: 33 1576 HSGA.exe Token: SeIncBasePriorityPrivilege 1576 HSGA.exe Token: 33 2068 HSGA.exe Token: SeIncBasePriorityPrivilege 2068 HSGA.exe Token: 33 1588 HSGA.exe Token: SeIncBasePriorityPrivilege 1588 HSGA.exe Token: 33 2796 HSGA.exe Token: SeIncBasePriorityPrivilege 2796 HSGA.exe Token: 33 1796 HSGA.exe Token: SeIncBasePriorityPrivilege 1796 HSGA.exe Token: 33 2460 HSGA.exe Token: SeIncBasePriorityPrivilege 2460 HSGA.exe Token: 33 2156 HSGA.exe Token: SeIncBasePriorityPrivilege 2156 HSGA.exe Token: 33 2980 HSGA.exe Token: SeIncBasePriorityPrivilege 2980 HSGA.exe Token: 33 2836 HSGA.exe Token: SeIncBasePriorityPrivilege 2836 HSGA.exe Token: 33 1832 HSGA.exe Token: SeIncBasePriorityPrivilege 1832 HSGA.exe Token: 33 2552 HSGA.exe Token: SeIncBasePriorityPrivilege 2552 HSGA.exe Token: 33 2144 HSGA.exe Token: SeIncBasePriorityPrivilege 2144 HSGA.exe Token: 33 1760 HSGA.exe Token: SeIncBasePriorityPrivilege 1760 HSGA.exe Token: 33 1756 HSGA.exe Token: SeIncBasePriorityPrivilege 1756 HSGA.exe Token: 33 2468 HSGA.exe Token: SeIncBasePriorityPrivilege 2468 HSGA.exe Token: 33 2272 HSGA.exe Token: SeIncBasePriorityPrivilege 2272 HSGA.exe Token: 33 896 HSGA.exe Token: SeIncBasePriorityPrivilege 896 HSGA.exe Token: 33 3068 HSGA.exe Token: SeIncBasePriorityPrivilege 3068 HSGA.exe Token: 33 2408 HSGA.exe Token: SeIncBasePriorityPrivilege 2408 HSGA.exe Token: 33 2700 HSGA.exe Token: SeIncBasePriorityPrivilege 2700 HSGA.exe Token: 33 2872 HSGA.exe Token: SeIncBasePriorityPrivilege 2872 HSGA.exe Token: 33 2228 HSGA.exe Token: SeIncBasePriorityPrivilege 2228 HSGA.exe Token: 33 2136 HSGA.exe Token: SeIncBasePriorityPrivilege 2136 HSGA.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 2904 HSGA.exe 2904 HSGA.exe 2904 HSGA.exe 2904 HSGA.exe 2904 HSGA.exe 2884 HSGA.exe 2884 HSGA.exe 2884 HSGA.exe 2884 HSGA.exe 2884 HSGA.exe 1864 HSGA.exe 1864 HSGA.exe 1864 HSGA.exe 1864 HSGA.exe 1864 HSGA.exe 1980 HSGA.exe 1980 HSGA.exe 1980 HSGA.exe 1980 HSGA.exe 1980 HSGA.exe 2268 HSGA.exe 2268 HSGA.exe 2268 HSGA.exe 2268 HSGA.exe 2268 HSGA.exe 2220 HSGA.exe 2220 HSGA.exe 2220 HSGA.exe 2220 HSGA.exe 2220 HSGA.exe 1384 HSGA.exe 1384 HSGA.exe 1384 HSGA.exe 1384 HSGA.exe 1384 HSGA.exe 2516 HSGA.exe 2516 HSGA.exe 2516 HSGA.exe 2516 HSGA.exe 2516 HSGA.exe 1224 HSGA.exe 1224 HSGA.exe 1224 HSGA.exe 1224 HSGA.exe 1224 HSGA.exe 1576 HSGA.exe 1576 HSGA.exe 1576 HSGA.exe 1576 HSGA.exe 1576 HSGA.exe 2068 HSGA.exe 2068 HSGA.exe 2068 HSGA.exe 2068 HSGA.exe 2068 HSGA.exe 1588 HSGA.exe 1588 HSGA.exe 1588 HSGA.exe 1588 HSGA.exe 1588 HSGA.exe 2796 HSGA.exe 2796 HSGA.exe 2796 HSGA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2472 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 30 PID 2156 wrote to memory of 2472 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 30 PID 2156 wrote to memory of 2472 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 30 PID 2156 wrote to memory of 2472 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 30 PID 2156 wrote to memory of 2712 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 31 PID 2156 wrote to memory of 2712 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 31 PID 2156 wrote to memory of 2712 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 31 PID 2156 wrote to memory of 2712 2156 JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe 31 PID 2472 wrote to memory of 2904 2472 KeyHack.exe 32 PID 2472 wrote to memory of 2904 2472 KeyHack.exe 32 PID 2472 wrote to memory of 2904 2472 KeyHack.exe 32 PID 2472 wrote to memory of 2904 2472 KeyHack.exe 32 PID 2472 wrote to memory of 2908 2472 KeyHack.exe 33 PID 2472 wrote to memory of 2908 2472 KeyHack.exe 33 PID 2472 wrote to memory of 2908 2472 KeyHack.exe 33 PID 2472 wrote to memory of 2908 2472 KeyHack.exe 33 PID 2908 wrote to memory of 2620 2908 KeyHack.exe 34 PID 2908 wrote to memory of 2620 2908 KeyHack.exe 34 PID 2908 wrote to memory of 2620 2908 KeyHack.exe 34 PID 2908 wrote to memory of 2620 2908 KeyHack.exe 34 PID 2908 wrote to memory of 2684 2908 KeyHack.exe 35 PID 2908 wrote to memory of 2684 2908 KeyHack.exe 35 PID 2908 wrote to memory of 2684 2908 KeyHack.exe 35 PID 2908 wrote to memory of 2684 2908 KeyHack.exe 35 PID 2684 wrote to memory of 2864 2684 KeyHack.exe 36 PID 2684 wrote to memory of 2864 2684 KeyHack.exe 36 PID 2684 wrote to memory of 2864 2684 KeyHack.exe 36 PID 2684 wrote to memory of 2864 2684 KeyHack.exe 36 PID 2684 wrote to memory of 1272 2684 KeyHack.exe 37 PID 2684 wrote to memory of 1272 2684 KeyHack.exe 37 PID 2684 wrote to memory of 1272 2684 KeyHack.exe 37 PID 2684 wrote to memory of 1272 2684 KeyHack.exe 37 PID 1272 wrote to memory of 2884 1272 KeyHack.exe 38 PID 1272 wrote to memory of 2884 1272 KeyHack.exe 38 PID 1272 wrote to memory of 2884 1272 KeyHack.exe 38 PID 1272 wrote to memory of 2884 1272 KeyHack.exe 38 PID 1272 wrote to memory of 1960 1272 KeyHack.exe 39 PID 1272 wrote to memory of 1960 1272 KeyHack.exe 39 PID 1272 wrote to memory of 1960 1272 KeyHack.exe 39 PID 1272 wrote to memory of 1960 1272 KeyHack.exe 39 PID 1960 wrote to memory of 1864 1960 KeyHack.exe 40 PID 1960 wrote to memory of 1864 1960 KeyHack.exe 40 PID 1960 wrote to memory of 1864 1960 KeyHack.exe 40 PID 1960 wrote to memory of 1864 1960 KeyHack.exe 40 PID 1960 wrote to memory of 1372 1960 KeyHack.exe 41 PID 1960 wrote to memory of 1372 1960 KeyHack.exe 41 PID 1960 wrote to memory of 1372 1960 KeyHack.exe 41 PID 1960 wrote to memory of 1372 1960 KeyHack.exe 41 PID 1372 wrote to memory of 1980 1372 KeyHack.exe 42 PID 1372 wrote to memory of 1980 1372 KeyHack.exe 42 PID 1372 wrote to memory of 1980 1372 KeyHack.exe 42 PID 1372 wrote to memory of 1980 1372 KeyHack.exe 42 PID 1372 wrote to memory of 1608 1372 KeyHack.exe 43 PID 1372 wrote to memory of 1608 1372 KeyHack.exe 43 PID 1372 wrote to memory of 1608 1372 KeyHack.exe 43 PID 1372 wrote to memory of 1608 1372 KeyHack.exe 43 PID 1608 wrote to memory of 2268 1608 KeyHack.exe 44 PID 1608 wrote to memory of 2268 1608 KeyHack.exe 44 PID 1608 wrote to memory of 2268 1608 KeyHack.exe 44 PID 1608 wrote to memory of 2268 1608 KeyHack.exe 44 PID 1608 wrote to memory of 1672 1608 KeyHack.exe 45 PID 1608 wrote to memory of 1672 1608 KeyHack.exe 45 PID 1608 wrote to memory of 1672 1608 KeyHack.exe 45 PID 1608 wrote to memory of 1672 1608 KeyHack.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_ae06a4d1e5342c6ace7587b0de04d4df.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"4⤵
- Executes dropped EXE
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1384
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"11⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"12⤵
- Executes dropped EXE
PID:1788 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"14⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"15⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"16⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"17⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"18⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2460
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"21⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"22⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"23⤵
- Executes dropped EXE
PID:1232 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"24⤵
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"25⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"25⤵
- Executes dropped EXE
PID:724 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"26⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"27⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"27⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"28⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"29⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"30⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"30⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"31⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"33⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"34⤵
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"35⤵
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"35⤵PID:1872
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"36⤵
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"36⤵PID:2460
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"37⤵
- Adds Run key to start application
PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"37⤵PID:2932
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"38⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"38⤵PID:2992
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"39⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"39⤵PID:600
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"40⤵
- Adds Run key to start application
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"40⤵PID:1476
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"41⤵PID:448
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"41⤵PID:2168
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"42⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"42⤵
- Drops file in System32 directory
PID:724 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"43⤵PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"43⤵PID:1748
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"44⤵PID:2784
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"44⤵PID:1692
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"45⤵PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"45⤵PID:2516
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"46⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"46⤵
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"47⤵PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"47⤵PID:1224
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"48⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"48⤵PID:3068
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"49⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"49⤵PID:2916
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"50⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"50⤵PID:2832
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"51⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"51⤵PID:548
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"52⤵PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"52⤵PID:2608
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"53⤵PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"53⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"54⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"54⤵
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"55⤵PID:784
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"55⤵PID:1272
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"56⤵PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"56⤵PID:1960
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"57⤵PID:860
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"57⤵PID:2092
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"58⤵
- Adds Run key to start application
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"58⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"59⤵
- System Location Discovery: System Language Discovery
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"59⤵PID:1320
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"60⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"60⤵PID:1188
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"61⤵
- Adds Run key to start application
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"61⤵PID:552
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"62⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"62⤵
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"63⤵PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"63⤵
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"64⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"64⤵PID:2472
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"65⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"65⤵
- Drops file in System32 directory
PID:3044 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"66⤵
- Adds Run key to start application
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"66⤵PID:2896
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"67⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"67⤵PID:3040
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"68⤵PID:2228
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"68⤵PID:548
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"69⤵PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"69⤵PID:3012
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"70⤵PID:2980
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"71⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"71⤵PID:3004
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"72⤵PID:1208
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"72⤵PID:1272
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"73⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"73⤵PID:1960
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:108
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"74⤵PID:1496
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"75⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"75⤵PID:448
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"77⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"77⤵PID:1888
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"78⤵PID:2248
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"78⤵PID:2380
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"79⤵PID:2532
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"79⤵PID:2572
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"80⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"80⤵PID:1592
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"81⤵PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"81⤵PID:2920
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"82⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"82⤵PID:2192
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"83⤵
- Adds Run key to start application
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"83⤵PID:2740
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"84⤵
- Adds Run key to start application
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"84⤵PID:2832
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"85⤵PID:804
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"85⤵
- Drops file in System32 directory
PID:2228 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"86⤵PID:1096
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"86⤵PID:2904
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"87⤵PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"87⤵PID:2964
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"88⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"88⤵PID:3008
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"89⤵PID:656
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"89⤵PID:1648
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"90⤵
- Adds Run key to start application
PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"90⤵PID:596
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"91⤵PID:1152
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"91⤵PID:2168
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"92⤵PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"92⤵
- Drops file in System32 directory
PID:1400 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"93⤵
- Adds Run key to start application
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"93⤵PID:2988
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"94⤵PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"94⤵PID:960
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"95⤵PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"95⤵PID:2808
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"96⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"96⤵PID:2024
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"97⤵
- Adds Run key to start application
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"97⤵PID:2420
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"98⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"98⤵PID:2408
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"99⤵
- Adds Run key to start application
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"99⤵PID:2888
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"100⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"100⤵PID:2628
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"101⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"101⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"102⤵PID:2136
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"102⤵PID:804
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"103⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"103⤵PID:2684
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"104⤵PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"104⤵
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"105⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"105⤵
- Drops file in System32 directory
PID:3004 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"106⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"106⤵
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"107⤵PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"107⤵PID:2060
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"108⤵PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"108⤵PID:996
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"109⤵
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"109⤵PID:2564
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"110⤵PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"110⤵PID:2144
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"111⤵PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"111⤵PID:1108
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"112⤵PID:568
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"112⤵PID:1776
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"113⤵PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"113⤵PID:1512
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"114⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"114⤵PID:552
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"115⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"115⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"116⤵PID:580
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"116⤵
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"117⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"117⤵PID:2768
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"118⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"118⤵PID:2068
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"119⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"119⤵PID:2752
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"120⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"120⤵PID:2792
-
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"121⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"C:\Users\Admin\AppData\Local\Temp\KeyHack.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\28463\HSGA.exe"C:\Windows\system32\28463\HSGA.exe"122⤵PID:2936
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-