Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2024 11:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://ufile.io/xl7sk0se
Resource
win10v2004-20240802-en
General
-
Target
https://ufile.io/xl7sk0se
Malware Config
Extracted
metasploit
windows/reverse_tcp
192.168.1.209:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Downloads MZ/PE file
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language paysoadss.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133715661437749285" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4182098368-2521458979-3782681353-1000\{6E0B7CC2-6D5A-4FEF-BA79-EEAC16AB6165} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe Token: SeShutdownPrivilege 4284 chrome.exe Token: SeCreatePagefilePrivilege 4284 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe 4284 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4284 wrote to memory of 4576 4284 chrome.exe 82 PID 4284 wrote to memory of 4576 4284 chrome.exe 82 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 3432 4284 chrome.exe 83 PID 4284 wrote to memory of 928 4284 chrome.exe 84 PID 4284 wrote to memory of 928 4284 chrome.exe 84 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85 PID 4284 wrote to memory of 4448 4284 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://ufile.io/xl7sk0se1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffca8c5cc40,0x7ffca8c5cc4c,0x7ffca8c5cc582⤵PID:4576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1964 /prefetch:22⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2240 /prefetch:32⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2272 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4324,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4508 /prefetch:12⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4684,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3660,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4916,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4532 /prefetch:12⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=5160,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:4160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5168,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Modifies registry class
PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5488,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5532 /prefetch:82⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4332,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5784,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5916,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5944 /prefetch:82⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5928,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5952,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5968,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6060,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3876,i,17141778780692995147,13638753412311143756,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2428
-
C:\Users\Admin\Desktop\paysoadss.exe"C:\Users\Admin\Desktop\paysoadss.exe"1⤵
- System Location Discovery: System Language Discovery
PID:840
-
C:\Users\Admin\Desktop\paysoadss.exe"C:\Users\Admin\Desktop\paysoadss.exe"1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5d9ea0072de231d90540c575c8b92038a
SHA1023ffa5f793d9a8ec1e95eb656fef76cd234d7e9
SHA25642e49314c08101adcb633317bed010fb81f1c61c0e49ffbfa184bd22ff1255f9
SHA512903d14ac1338a95dd548d229e077788bd1b51c5f01d01f46ef79de4efe6b55f587deef8b6db26531d119e4e1966bac5b6c43ceca641e236372abdacd87768770
-
Filesize
212KB
MD508ec57068db9971e917b9046f90d0e49
SHA128b80d73a861f88735d89e301fa98f2ae502e94b
SHA2567a68efe41e5d8408eed6e9d91a7b7b965a3062e4e28eeffeefb8cdba6391f4d1
SHA512b154142173145122bc49ddd7f9530149100f6f3c5fd2f2e7503b13f7b160147b8b876344f6faae5e8616208c51311633df4c578802ac5d34c005bb154e9057cf
-
Filesize
600B
MD5574c60c1640d58d26de7c52825aec391
SHA1869503141b7e199b31d6692eb83af90578a491df
SHA256126aaee2058b85936c4587ec8c2821152ce7ebd7bcf0a1f7f51363c1d0231140
SHA512c5bc169cb8aa5b89920d775b65df44b63a7238a10cf4e3effe0f6be75c1cdfba8084e40543e6f54ec06be2eaf14f8bd49fcb73d33105490c038ca69c9dad6513
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD547569a9b32a786de2a070b41ce1b9e28
SHA1bc06d659e2246d993322573c1334a59f94c7dfca
SHA256da47e7f97b98762061b493107c5f82a59b70f048726c3cd586eb4826f5464eb2
SHA5122f1d103feff7ebda8bd449af285cdb96627720bf40ab3407e07c5cab96ff8aceefb7f0f095a56522c056a8e733b6e4456d1a1f9a830036cccd30e23672447cf1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5d0a6090357eff75bc14245977cc72452
SHA1b47191814c9775d32d45f76f57a9603d51973d7e
SHA256a558e1ba851fc542e39b7ced7943684497aef490caf4bb69ffa1706eb1a356c7
SHA512170f06c62da2335811b1d3a592955bb00520d6b73525f19b67edd9dfbeacfa8a113009d4a9a4e0d028ca143311a8a8e0c39040d15f65f1372e1f7d6bf8aa6c5e
-
Filesize
10KB
MD5ea1a26fba8dc5f30c338986c96945f4f
SHA1e21fe259bc443f183eb2827721ee2c58f5f6a91f
SHA2563e3587305751b3aef7816d0ffe4b1eaa727036cabe5493dfe65b3790e51ee40d
SHA5120cc24325de029115a274e02933fbf9300b2571f7339e2fd87ad9ec9d390af18dd3e4198d73f3816f43da623f4900a26193cdf01bc8259a7a394b440dae4d6d09
-
Filesize
10KB
MD504a77250b72c745a0d167a513790024f
SHA159e95ab8fe7bd7b5070430b2a72880146b1e8da3
SHA2561d4efd14f27ca68a54a8af39b6e57db403f3d6fc944204098f5fd808b031e95d
SHA512dd603f705bb397f719321ad8ef58895fa7853731d6b3e97d7d56f28bd591fce243e6ce4b4c0f2ee0eb10c6d15a93a5f7ce3bd5036384b14ba03207eabbbaf37f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD58dc07e6c4406c38604d4543e76d7a806
SHA15e0e9596c7f8c21166b15d838fd7efdd88859570
SHA2569c711725b58cc07cc9aa1316b67f93a052fc7e5b17dcf9eeb0e4ddf3c6e792d7
SHA5123871d52db146bef8b0e98b3a5f17a66de49a0830545728ad3e0a3afcafa8593e5255b5df4885d496729e5d7bff045a1d54f6c26f9ce01b43c37dce3921192f72
-
Filesize
99KB
MD58cbcdd1317f52a383dd81e1239786d46
SHA19cd3a6ae0ab65379ecc81ca6a9ea7c599585b6f1
SHA256593f510bb6d7530f4aef25592bb6a74f05f601cf37cd8e1bb9f6786b67d59c03
SHA5125645536770e2b55355de93ff5aceda62391d5b70ae093505b4dbf5fc75baf9cfd1b852ac4b21b61c58fcc354991ea7483a24fa1fec9201e5371b21f6ff09ba00
-
Filesize
99KB
MD56636cabe030a85757f3632f84d0d0e35
SHA14e6ee4f611a8176ca19c488e0d0508becea2d698
SHA256ef4ba9835530213b57293079bdc2f42b6df58f64eb21eeef5f36668982f41134
SHA51248e5e67e923ab1c5ef911a7eb359732de9277d0cf1d3fc0e5d2b1c6c3cae34008ab5d6420e1ee72433276b17440318ddb9f4cd2ee08cc34b2253d39e7b35d126
-
Filesize
99KB
MD53326c224b949f8e641e671c6f1bd71ae
SHA12cab0d3506ea86f75ceb9854194e1da8db45ed54
SHA256bbed6b15fe01b9e06f9f29de74a5ed4c31d105ac819b640b3f81edbd5c8d4ff2
SHA5128f458037c6ea5ba5b84bd4a6a5ca3fadc5da2e7312bcd3663988ba0ca8f2aca124568edeaeaba066851e9f594b42f4d768a9ba9850b51b1373f36c7b588df928
-
Filesize
72KB
MD5a3c3785d55047ef528bb002c07a785f4
SHA1a74e4e846f507ca081d71b05235fd73035f812ad
SHA256586cc0eaa5bf0b3366d6049f99beade4c2dab09d540db68f6d00c48adca26975
SHA51288064e1c5549910c56102ed1ff7af6890ccc2b981780fc685e79d17402f9d5eed42df0899641bd1f9f2af4a32da453c9d5a0b211bad774fcc153556962737b04