Threat Database Backdoors Backdoor.Quasar.SA

Backdoor.Quasar.SA

By CagedTech in Backdoors

Threat Scorecard

Popularity Rank: 26,867
Threat Level: 60 % (Medium)
Infected Computers: 2
First Seen: July 1, 2025
Last Seen: April 22, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Backdoor.Quasar.SA
Signature status: No Signature

Known Samples

MD5: fc671ea4bbcbc4cc86cfb6fa92111a22
SHA1: c5a91b3574b8a5c0b7511220cec975d6ddc12037
SHA256: DBFC98C2A12DBAA4C762F66B53DFF8142FD5B761AD48C2E3B11776D6B4A79055
File Size: 3.08 MB, 3078144 bytes
MD5: 2d06465087a7826b7b5b9e4774345a85
SHA1: 3a397d81a3a1381b91dc6fbe7c32071c40efe1fe
SHA256: 0AB7E57A2C44EAC46DA853A2BC29149D4A0474528A211D3AB57B72F5B2AC68DD
File Size: 2.99 MB, 2993152 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have resources
  • File doesn't have security information
  • File is 64-bit executable
  • File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Prime Max Micro Inc
File Description Premium Global AI
File Version 9.4.65.8368
Internal Name express_graph_cache
Legal Copyright Copyright (C) 2023 Prime Max Micro Inc
Original Filename express_graph_cache.exe
Product Name Express Graph Cache Intelligent Maker
Product Version 9.4.65.8368

File Traits

  • golang
  • No Version Info
  • x64

Block Information

Total Blocks: 4,430
Potentially Malicious Blocks: 1
Whitelisted Blocks: 4,418
Unknown Blocks: 11

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Agent.GFG
  • Agent.JFJ
  • Agent.KTSC
  • Dropper.FFB
  • Dropper.FFC
Show More
  • Dropper.PPA
  • Quasar.SA
  • ShellcodeRunner.TV
  • Trojan.ShellcodeRunner.Gen.FC
  • Trojan.ShellcodeRunner.Gen.FZ
  • Trojan.ShellcodeRunner.Gen.GV
  • Trojan.ShellcodeRunner.Gen.JX

Files Modified

File Attributes
c:\inetpub\088424020bedd6 Generic Write,Read Attributes
c:\inetpub\9e8d7a4ca61bd9 Generic Write,Read Attributes
c:\inetpub\conhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\inetpub\runtimebroker.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\program files (x86)\windows sidebar\gadgets\2afe4ed40d5a86 Generic Write,Read Attributes
c:\program files (x86)\windows sidebar\gadgets\backgroundtaskhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\program files (x86)\windows sidebar\gadgets\eddb19405b7ce1 Generic Write,Read Attributes
c:\program files (x86)\windows sidebar\gadgets\smartscreen.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\program files\msbuild\microsoft\windows workflow foundation\v3.0\cmd.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\program files\msbuild\microsoft\windows workflow foundation\v3.0\ebf1f9fa8afd6d Generic Write,Read Attributes
Show More
c:\recovery\oem\55b276f4edf653 Generic Write,Read Attributes
c:\recovery\oem\cd89ddd3d81b06 Generic Write,Read Attributes
c:\recovery\oem\startmenuexperiencehost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\recovery\oem\tiworker.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\sandbox_local\f3b6ecef712a24 Generic Write,Read Attributes
c:\sandbox_local\spoolsv.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\sandbox_stage\mnt\nas\vt_results\a5\84\registry.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\sandbox_stage\mnt\nas\vt_results\a5\84\registry.exe Generic Write,Read Attributes,Delete,LEFT 262144
c:\sandbox_stage\mnt\nas\vt_results\a5\84\registry.exe Generic Write,Read Data,Read Attributes,Delete,LEFT 262144
c:\startup_test\logs\21b1a557fd31cc Generic Write,Read Attributes
c:\startup_test\logs\926e3e4b62361b Generic Write,Read Attributes
c:\startup_test\logs\dashost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\startup_test\logs\securityhealthservice.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\appdata\local\temp\lsass_helper.exe Generic Write,Read Attributes
c:\users\user\downloads\backgroundtaskhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\users\user\downloads\eddb19405b7ce1 Generic Write,Read Attributes
c:\windows\servicestate\backgroundtaskhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Attributes
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Attributes,Delete,LEFT 262144
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Attributes,LEFT 262144
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Data,Read Attributes
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Data,Read Attributes,Delete,LEFT 262144
c:\windows\servicestate\backgroundtaskhost.exe Generic Write,Read Data,Read Attributes,LEFT 262144
c:\windows\servicestate\eventlog\data\conhost.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144
c:\windows\servicestate\eventlog\data\conhost.exe Generic Write,Read Attributes,Delete,LEFT 262144
c:\windows\servicestate\eventlog\data\conhost.exe Generic Write,Read Data,Read Attributes,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKCU\software\microsoft\windows\currentversion\run::dashost "C:\startup_test\logs\dasHost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::dashost "C:\startup_test\logs\dasHost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\winlogon::shell explorer.exe, "C:\startup_test\logs\dasHost.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::tiworker "C:\Recovery\OEM\TiWorker.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::tiworker "C:\Recovery\OEM\TiWorker.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\winlogon::shell explorer.exe, "C:\startup_test\logs\dasHost.exe", "C:\Recovery\OEM\TiWorker.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::conhost "C:\inetpub\conhost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::conhost "C:\inetpub\conhost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\winlogon::shell explorer.exe, "C:\startup_test\logs\dasHost.exe", "C:\Recovery\OEM\TiWorker.exe", "C:\inetpub\conhost.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::spoolsv "C:\sandbox_local\spoolsv.exe" RegNtPreCreateKey
Show More
HKLM\software\microsoft\windows\currentversion\run::spoolsv "C:\sandbox_local\spoolsv.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\winlogon::shell explorer.exe, "C:\startup_test\logs\dasHost.exe", "C:\Recovery\OEM\TiWorker.exe", "C:\inetpub\conhost.exe", "C:\sandbox_local\sp RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::runtimebroker "C:\sandbox_live\logs\RuntimeBroker.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::runtimebroker "C:\sandbox_live\logs\RuntimeBroker.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::backgroundtaskhost "C:\Users\user\downloads\backgroundTaskHost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::backgroundtaskhost "C:\Users\user\downloads\backgroundTaskHost.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::startmenuexperiencehost "C:\Recovery\oem\StartMenuExperienceHost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::startmenuexperiencehost "C:\Recovery\oem\StartMenuExperienceHost.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::cmd "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\cmd.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::cmd "C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\cmd.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::smartscreen "C:\Program Files (x86)\Windows Sidebar\Gadgets\smartscreen.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::smartscreen "C:\Program Files (x86)\Windows Sidebar\Gadgets\smartscreen.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::securityhealthservice "C:\startup_test\logs\SecurityHealthService.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::securityhealthservice "C:\startup_test\logs\SecurityHealthService.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::runtimebroker "C:\inetpub\RuntimeBroker.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::runtimebroker "C:\inetpub\RuntimeBroker.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::microsoftedgeupdate "C:\sandbox_live\logs\MicrosoftEdgeUpdate.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::microsoftedgeupdate "C:\sandbox_live\logs\MicrosoftEdgeUpdate.exe" RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\run::backgroundtaskhost "C:\Program Files (x86)\windows sidebar\gadgets\backgroundTaskHost.exe" RegNtPreCreateKey
HKLM\software\microsoft\windows\currentversion\run::backgroundtaskhost "C:\Program Files (x86)\windows sidebar\gadgets\backgroundTaskHost.exe" RegNtPreCreateKey
HKCU\software\1f3a1144b1e5e1b1bd7066ca34e35081f5f539b3::3090a5b296d1a37dd24e9d2ab4857921b109ac35 WyJDOlxcVXNlcnNcXENyYml1Zmd6XFxBcHBEYXRhXFxMb2NhbFxcVGVtcFxcbHNhc3NfaGVscGVyLmV4ZSIsIkM6XFxzdGFydHVwX3Rlc3RcXGxvZ3NcXGRhc0hvc3Qu RegNtPreCreateKey

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAccessCheck
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcConnectPort
  • ntdll.dll!NtAlpcConnectPortEx
  • ntdll.dll!NtAlpcQueryInformation
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtAlpcSetInformation
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtAssociateWaitCompletionPacket
  • ntdll.dll!NtCancelTimer2
Show More
  • ntdll.dll!NtCancelWaitCompletionPacket
  • ntdll.dll!NtClearEvent
  • ntdll.dll!NtClose
  • ntdll.dll!NtCompareSigningLevels
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateIoCompletion
  • ntdll.dll!NtCreateKey
  • ntdll.dll!NtCreateMutant
  • ntdll.dll!NtCreatePrivateNamespace
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtCreateThreadEx
  • ntdll.dll!NtCreateTimer
  • ntdll.dll!NtCreateTimer2
  • ntdll.dll!NtCreateWaitCompletionPacket
  • ntdll.dll!NtCreateWorkerFactory
  • ntdll.dll!NtDelayExecution
  • ntdll.dll!NtDeviceIoControlFile
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtDuplicateToken
  • ntdll.dll!NtEnumerateKey
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFlushProcessWriteBuffers
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtGetCachedSigningLevel
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtNotifyChangeKey
  • ntdll.dll!NtOpenDirectoryObject
  • ntdll.dll!NtOpenEvent
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcess
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtOpenSymbolicLinkObject
  • ntdll.dll!NtOpenThreadToken
  • ntdll.dll!NtPowerInformation
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDefaultLocale
  • ntdll.dll!NtQueryDirectoryFileEx
  • ntdll.dll!NtQueryEvent
  • ntdll.dll!NtQueryFullAttributesFile
  • ntdll.dll!NtQueryInformationFile
  • ntdll.dll!NtQueryInformationJobObject
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryLicenseValue
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQuerySecurityObject
  • ntdll.dll!NtQuerySymbolicLinkObject
  • ntdll.dll!NtQuerySystemInformation
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtQueryWnfStateData
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtReadRequestData
  • ntdll.dll!NtReadVirtualMemory
  • ntdll.dll!NtReleaseMutant
  • ntdll.dll!NtReleaseSemaphore
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRemoveIoCompletionEx
  • ntdll.dll!NtResumeThread
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationKey
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationThread
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtSetTimer2
  • ntdll.dll!NtSetTimerEx
  • ntdll.dll!NtSubscribeWnfStateChange
  • ntdll.dll!NtTerminateProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtUnmapViewOfSectionEx
  • ntdll.dll!NtUnsubscribeWnfStateChange
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForMultipleObjects
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady

3 additional items are not displayed above.

Network Winsock2
  • WSAStartup
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetComputerName
  • GetComputerNameEx
  • GetUserDefaultLocaleName
  • GetUserName
  • GetUserObjectInformation
Other Suspicious
  • AdjustTokenPrivileges
Encryption Used
  • BCryptOpenAlgorithmProvider
  • CryptAcquireContext
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation

Shell Command Execution

C:\Users\Crbiufgz\AppData\Local\Temp\lsass_helper.exe C:\Users\Crbiufgz\AppData\Local\Temp\lsass_helper.exe

Trending

Most Viewed

Loading...