Analysis
-
max time kernel
26s -
max time network
28s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-12-2024 08:17
Static task
static1
General
-
Target
Aimbot MTA.zip
-
Size
1.1MB
-
MD5
daa57cdeeab30823f89e5349b832a817
-
SHA1
feb679856d7a4a04d5e1a26e741dd6deb5ee0e88
-
SHA256
129c9712c6553669392a034fc14842a4045df98bb8abce95a6b74ecf9760a4de
-
SHA512
1403f94c54374a91e8d9e29b594b490ff49c16b4bd404148157e7b2a7eb57beced3459e612045433e3b4a0f78aca93d34fe2f4c198fc5669dee85c139273f376
-
SSDEEP
24576:3bPC4RI32t9KyRPCKNJrYjWj1JkpsnWvWjI7mBPJiOMSeFAPNuHWE:rKsIm3K8voCApsnBnFJirjSU2E
Malware Config
Extracted
quasar
1.4.1
Office04
azxq0ap.localto.net:3425
e51e2b65-e963-4051-9736-67d57ed46798
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
WindowsUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral1/files/0x0022000000046673-3.dat family_quasar behavioral1/memory/992-5-0x0000000000D20000-0x0000000001076000-memory.dmp family_quasar -
Executes dropped EXE 2 IoCs
pid Process 992 Aimbot MTA.exe 4012 WindowsUpdate.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795882423227070" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 852 schtasks.exe 4508 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeRestorePrivilege 4708 7zFM.exe Token: 35 4708 7zFM.exe Token: SeSecurityPrivilege 4708 7zFM.exe Token: SeDebugPrivilege 992 Aimbot MTA.exe Token: SeDebugPrivilege 4012 WindowsUpdate.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe Token: SeShutdownPrivilege 4964 chrome.exe Token: SeCreatePagefilePrivilege 4964 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 4708 7zFM.exe 4708 7zFM.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe 4964 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4012 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 852 992 Aimbot MTA.exe 101 PID 992 wrote to memory of 852 992 Aimbot MTA.exe 101 PID 992 wrote to memory of 4012 992 Aimbot MTA.exe 103 PID 992 wrote to memory of 4012 992 Aimbot MTA.exe 103 PID 4964 wrote to memory of 3880 4964 chrome.exe 105 PID 4964 wrote to memory of 3880 4964 chrome.exe 105 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1436 4964 chrome.exe 106 PID 4964 wrote to memory of 1108 4964 chrome.exe 107 PID 4964 wrote to memory of 1108 4964 chrome.exe 107 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 PID 4964 wrote to memory of 4512 4964 chrome.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Aimbot MTA.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4192,i,18033710974209630210,2205953364507939555,262144 --variations-seed-version --mojo-platform-channel-handle=4196 /prefetch:81⤵PID:1176
-
C:\Users\Admin\Desktop\Aimbot MTA.exe"C:\Users\Admin\Desktop\Aimbot MTA.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:852
-
-
C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WindowsUpdate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\WindowsUpdate.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4508
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffa7c67cc40,0x7ffa7c67cc4c,0x7ffa7c67cc582⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2200 /prefetch:32⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2292,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2212 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3128,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4420,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4784 /prefetch:82⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5012,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5024 /prefetch:82⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:5576 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0x7ff778414698,0x7ff7784146a4,0x7ff7784146b03⤵
- Drops file in Windows directory
PID:5604
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:5708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:5752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4832,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5300,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=5040 /prefetch:22⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4856,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4472 /prefetch:12⤵PID:5996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3212,i,5891338943964182520,1407527363643809966,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2660
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD549fd87a9dc8748090e1ed6601d9e87b7
SHA16efb2186ead767d0879151e292cf1e0d1f3d47ef
SHA256f203078aca483051a903a70d656cc4b4ba591d6c3b76e01edaff92125afc25d9
SHA51291d49ea3bbb51cd21d237db91057d50cb9e7152836d0cc433619745a457a0478c8ab42d75d3b920cfb212429fe45349d838f62070faca0995f1f0f38c8ab27ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5adc392f12811df3ccb0cc1700f9aecc1
SHA158a98ce11a32ca3ddfa77ad1aa04cdf343e38b58
SHA256495078c14d1b2b5ff660123f14ffabb8b2dbe7a39d3954e8ff173a5bfaf62506
SHA5120fd9a406552db715727c4d7bee15f16e10d8fba600d0a82248d7c1afb3203ece9e0bb6463b51b18ebea30bfa86dc0e8eb8c2baca53d71214c154e76ce083de8d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
850B
MD57b4b42e526de09d4a763ac76162b6346
SHA1bd3b33b879a35b60e06b7fd9668800487f2b1727
SHA25667848911d96fcab20debd96881d1ee4e447ddf98bdb62fcdf2eb66a53c9547c8
SHA5125e69d7128f673a0e87fabf0855816fd4a1b2fc6cbc659dc5c9bc0bf9809599fea24e552ce254f4707286cd7a4d0cbd6395cd770711461ae6e5853a58e2b3c449
-
Filesize
9KB
MD5179db21ab8c37ddfd45e9f435eba6d06
SHA12c6dbbcb1890e65cf3a90343576a1a70bc9d2fc4
SHA256cf6cadeda1eccfc6f0e8008f2c977fca28a95d5e7aaf44fc96aeefde9bab269f
SHA512e3e376b5582863907a4199555cf189fb4bc1f54413895fec0bd9a9556ef0e9632c8e717f589967ee0350378ee05cf226e4cb7411bd88ea19c0f4125535847c96
-
Filesize
15KB
MD526be900d1842017f2a552319ed041ac7
SHA1056eb738751a7f2a79e1970b8cd51e8bb7f676cd
SHA25662408a4955fae5cb0884708e8d57e988b6f2ecec2061c341515fef8367b0cebf
SHA512370d1df953f6e4163adbe4a0958a8987c2d87580eb2b839e8c9f1c2d3b54f9a289551f906cf9bbd07059ab576993c4f00ad9d727151c5307f12ec7704e0511c3
-
Filesize
233KB
MD50f019d196e505ad1688d977fe0bf05cf
SHA13d5781f1c0caeb3245d1e02c8047d17363098506
SHA2562ad97f1ac47f7d17e62bdc6508b93de33e59653b8a110890f8e14938b38bac72
SHA5121ef4382c0058980e85128ed2c3b9bbd8c8b958521e7cfa3f5a526cfad49c380ce77f87a36b1e1af4ba49a1ef04d86427bfac9cd395fdae68d44c2c8d68fb765d
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
3.3MB
MD5232fbce8fc20397039e7115d6736c5f4
SHA1ec3f9e41474a0e2597c5aec4be25158ccd2d4c68
SHA256f9a036faaf0d8069cad71070e3327f2b6318e7026338c32eb46dc23c18ab1291
SHA512b00d44a3fc0685b917a50008d66efd44c697692a7f02b2bc18f3c325642a8bb94d5966bd66d21fa045aa24d02a88600b3b66122e3a3f6309b3854f6820bc41de