Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
29/04/2024, 12:46
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://xploit.games/roblox/esp/
Resource
win10v2004-20240419-en
General
-
Target
https://xploit.games/roblox/esp/
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\7-Zip\History.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ast.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\io.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\be.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\el.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ku-ckb.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\yo.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sa.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\af.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\uk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\bg.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\es.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nb.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\vi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pt.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\is.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ky.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mng.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ms.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pa-in.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ro.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7zFM.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ca.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\da.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\et.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\si.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sr-spc.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\descript.ion msiexec.exe File created C:\Program Files (x86)\7-Zip\7-zip.chm msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\co.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\cs.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\cy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kaa.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.dll msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\he.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lt.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\tt.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\az.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\bn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fa.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kab.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mng2.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\tk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\eo.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\tg.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7zG.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\readme.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ga.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ps.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\zh-tw.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ug.txt msiexec.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{23170F69-40C1-2701-2401-000001000000} msiexec.exe File opened for modification C:\Windows\Installer\MSIEBA8.tmp msiexec.exe File created C:\Windows\Installer\e57eb00.msi msiexec.exe File created C:\Windows\Installer\e57eafc.msi msiexec.exe File opened for modification C:\Windows\Installer\e57eafc.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\PackageCode = "96F071321C0410724210000020000000" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Version = "402718720" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\Local Settings OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Program = "Complete" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\LanguageFiles = "Complete" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files (x86)\\7-Zip\\7-zip.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\関ꮀᔀ蠀\ = "crdownload_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Complete msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\PackageName = "7z2401.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\DragDropHandlers\7-Zip msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\.crdownload\ = "crdownload_auto_file" OpenWith.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\open\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\関ꮀᔀ蠀 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\ProductName = "7-Zip 24.01" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Drive\shellex\DragDropHandlers\7-Zip msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\.crdownload OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3411335054-1982420046-2118495756-1000_Classes\crdownload_auto_file\shell\open OpenWith.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 521412.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 948989.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2464 msedge.exe 2464 msedge.exe 3184 msedge.exe 3184 msedge.exe 4816 identity_helper.exe 4816 identity_helper.exe 6032 msedge.exe 6032 msedge.exe 3600 msiexec.exe 3600 msiexec.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe 1228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1584 msiexec.exe Token: SeIncreaseQuotaPrivilege 1584 msiexec.exe Token: SeSecurityPrivilege 3600 msiexec.exe Token: SeCreateTokenPrivilege 1584 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1584 msiexec.exe Token: SeLockMemoryPrivilege 1584 msiexec.exe Token: SeIncreaseQuotaPrivilege 1584 msiexec.exe Token: SeMachineAccountPrivilege 1584 msiexec.exe Token: SeTcbPrivilege 1584 msiexec.exe Token: SeSecurityPrivilege 1584 msiexec.exe Token: SeTakeOwnershipPrivilege 1584 msiexec.exe Token: SeLoadDriverPrivilege 1584 msiexec.exe Token: SeSystemProfilePrivilege 1584 msiexec.exe Token: SeSystemtimePrivilege 1584 msiexec.exe Token: SeProfSingleProcessPrivilege 1584 msiexec.exe Token: SeIncBasePriorityPrivilege 1584 msiexec.exe Token: SeCreatePagefilePrivilege 1584 msiexec.exe Token: SeCreatePermanentPrivilege 1584 msiexec.exe Token: SeBackupPrivilege 1584 msiexec.exe Token: SeRestorePrivilege 1584 msiexec.exe Token: SeShutdownPrivilege 1584 msiexec.exe Token: SeDebugPrivilege 1584 msiexec.exe Token: SeAuditPrivilege 1584 msiexec.exe Token: SeSystemEnvironmentPrivilege 1584 msiexec.exe Token: SeChangeNotifyPrivilege 1584 msiexec.exe Token: SeRemoteShutdownPrivilege 1584 msiexec.exe Token: SeUndockPrivilege 1584 msiexec.exe Token: SeSyncAgentPrivilege 1584 msiexec.exe Token: SeEnableDelegationPrivilege 1584 msiexec.exe Token: SeManageVolumePrivilege 1584 msiexec.exe Token: SeImpersonatePrivilege 1584 msiexec.exe Token: SeCreateGlobalPrivilege 1584 msiexec.exe Token: SeBackupPrivilege 5544 vssvc.exe Token: SeRestorePrivilege 5544 vssvc.exe Token: SeAuditPrivilege 5544 vssvc.exe Token: SeBackupPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 1584 msiexec.exe 1584 msiexec.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe 3184 msedge.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe 5952 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3184 wrote to memory of 2544 3184 msedge.exe 83 PID 3184 wrote to memory of 2544 3184 msedge.exe 83 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2072 3184 msedge.exe 84 PID 3184 wrote to memory of 2464 3184 msedge.exe 85 PID 3184 wrote to memory of 2464 3184 msedge.exe 85 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 PID 3184 wrote to memory of 4752 3184 msedge.exe 86 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://xploit.games/roblox/esp/1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbf9b46f8,0x7ffdbf9b4708,0x7ffdbf9b47182⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:5652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:12⤵PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:6032
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\7z2401.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18069878002926204709,13810619416837764963,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1464
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5052
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5968
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵PID:456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD57b8ac8bfe791170bef1c4e59987ef693
SHA1fced26e6b1dcd7f24dcb8582f97dbd2a27e28df1
SHA256d64fc51999bd5603c572bb1617af3067cd702748b5211a8c997a747fbf7dac16
SHA5129178bcae82049d385cd7366f2638a76e4a65332406b161821f3e44dfefb3e0ba5ee3385ca87bffcc1949fa495a47316e31a5f4c90e1a5db8ee719a9bc065884a
-
Filesize
152B
MD59dc60aef38e7832217e7fa02d6f0d9f6
SHA14f8539dc7d5739b36fe976a932338f459d066db6
SHA2568a0ee0b6fafabb256571b691c2faf77c7244945faa749c72124d5eb43a197a32
SHA51218371541811910992c2b84a8eae7e997e8627640bdb60b9e82751389e50931db9b3e206d31f4d9d2dc3ca25ea3a82c0be413ecb0ef3ac227a14e54f406eaa7e7
-
Filesize
152B
MD57ac03b15b68af2d5cb5c8063057cc83e
SHA19b2d4db737f57322ff5c4bbddd765b3177f930ab
SHA256b90d7596301470b389842eecb46bd3a8e614260b0d374d5c35a36afb9c71a700
SHA512a5e9f40dd9040803046b0218fab6b058d49e5e2a3ada315e161fe9fc80ebb8d6d4442ccc1c98d19e561fc7c61bcf43d662fe2231cacacb447876a2113c2e3732
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD572f20d71815fb58c4fc2d53a014ba2e9
SHA1ebf01e775322016649e00521dd46c7d57ba60c80
SHA256512b834f9b5dc93380a22fee4f9fbf5564047797f4c3054d4d65d1a9072e9b1d
SHA512c882d40e220bcf23dd297bd963bf78742d07745904bf09ee74ce56c7e4a59d526d5e346cad3e5ace8d2467b4ac533b9260f5ab1af9323ace265c6f3f9a3c5f1a
-
Filesize
1KB
MD5a87ed6ba5cbbda82f04fd40e41532e28
SHA1ee0c3b6f184e2b5bc8ebc57ebde3adf14f523653
SHA2563cdebbf2174df2263d20d174bf858f6f467e11fe1cfa074de4cc891a2188a5cb
SHA512cc1d11b1f099ecd7f418021cf891d3869025995bcab298793a5e1b016b9dae815dd94b45b018f9d067f89a36158667276961dbb863a6791b4909416ff94602f5
-
Filesize
7KB
MD57e321e57354acae6cc8d48bbc54c0a4e
SHA16bc752fe5ee9337cbc836f4bda239c815ee7331d
SHA2569ba442f161222c252e9f59c14671b7bafc59df275b203bcbc9d1f7e6b73f9fa0
SHA51286d4f81d353e27df8529133c7b51f065268c6307bbc5156412f9cbab9841e6013857108817e2d6096dfc55eae742631017f9ec26e37eb738dd740ba354e7ae51
-
Filesize
7KB
MD5694ff3a7bfa89160f4b345e867c15a86
SHA15df89f19befe6fd0513671902a0f1ea61f9320ef
SHA256df4f59ff7d571671362f2deb0a8f4e60b36be5d278f82c3c9f8e639a69f194cf
SHA5125b1ce0e4ef4b7148bb978d985b333b5bee7cf567421f8edb2dfe9b0db974af08583e68b066265ecacea6009ed03a0757caedfe96f5b79ad882bb70d06b73c2ec
-
Filesize
6KB
MD564ae54f07a4265d13a3d27e049d78902
SHA1ec872d3e9e472abc365f3179033071f3cea3d2e6
SHA25655c1a5ccb2db65f9bf629d5b565307b170d757c9a848c10fd56d4c5f3a41f7e4
SHA51220c55c3d65ff9d962f67561d18d69f2b15472869c4f8210fbc7c1dabccc1afd86de9acf019f7814a38b07d67f111bb1d5d51a4a9409272dfeaf3bebf46baf402
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cdf74bbedf971047e5de71d2539870d6
SHA1446bd6dc20420c1ec6af35ab861d4a5cb10c0cdb
SHA25656f6489c5aaea3914e4ac5edf1f2a1688c3cccc332fde29c8795ee4713b4fd55
SHA512d2d2197398dc6362f4838d38bbb0ccd9c1e91046a2c88077f5ab53650f8877fad1d3820c0cf15c8d72efe4795257517842a8965b1ffe3f0dd21c7ebfb9865270
-
Filesize
12KB
MD5c48dd446622513dd8efda3c7fc1ea9bc
SHA12bc365216adf3ea7865a782f74f5ef7c3c6e8e31
SHA25628565b9ad37ea6fe2d3d941c4fc670c56f1bfbb367db55ff2338f6e55bfef6d2
SHA5125739048e7bfe8de6dd51e3de747a5bb7fefea24270872e9f3bd6bcc94c293e00bc74352f1653004e550174da055a15f97b15f56fb0092c357b7281fc11a1a5a4
-
Filesize
11KB
MD5aa1fea03793abe24eee2e419f861db4c
SHA10b405b2da0232769c4cffc25c7acf75a8114709c
SHA2567acef65e3654faa68d9286ac1b124cc2bad784a1053888e0f26cd226960a60e5
SHA512974f55c315f17650c632f70aa42dead8ea90762fc260cf100cc2adc144814b0b8e4d0ddd867afb2e54092e2183a5a99530d1f3f767de75de6f93c6ca4268f674
-
Filesize
1.4MB
MD5a141303fe3fd74208c1c8a1121a7f67d
SHA1b55c286e80a9e128fbf615da63169162c08aef94
SHA2561c3c3560906974161f25f5f81de4620787b55ca76002ac3c4fc846d57a06df99
SHA5122323c292bfa7ea712d39a4d33cdd19563dd073fee6c684d02e7e931abe72af92f85e5bf8bff7c647e4fcdc522b148e9b8d1dd43a9d37c73c0ae86d5efb1885c8
-
Filesize
24.1MB
MD558a8ec3d6327e965ebe8f0441987900c
SHA194978f304d3d16823206cb6c73cdfa0b81adaa05
SHA2567dc6cf5f5f36cf66683033f8cabfdf24810ca7ecc78b2f733195acedaa63c464
SHA512f8b01c12e5185e3f316fc378265a5d669f929ed459caa205159ec49a8952ad79ca6455019d15766facd7beb21b37652030096af4c5b66f5aafc8e3db4bfae8f7
-
\??\Volume{66c435d2-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{7a465993-4ec7-46a8-9b3a-a765af211d98}_OnDiskSnapshotProp
Filesize6KB
MD53ce4241f3ccfa4515afbd65dfd408234
SHA14e78abbff70fd69a988f348791602ce8fa7319cf
SHA2563fdc6871d5c04a3573b82de1fb468fffff20c851bc2144e8c2678b34cad901d9
SHA512f71ffcac70a2668633d3afc0437abc8613e600615c16873eac1fdfff82a997e72ad04ae2b9f5917457e1a450cee804a152345a411aa0dc52e044fc6e372aaf36