Analysis
-
max time kernel
131s -
max time network
116s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-08-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
Roblox.Account.Manager.3.7.2.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
Roblox Account Manager.exe
Resource
win11-20240802-en
General
-
Target
Roblox.Account.Manager.3.7.2.zip
-
Size
4.2MB
-
MD5
d58b79cb3d3635ba963427362f75d075
-
SHA1
0e33eeff9b625fceb2d2d0195e6f32523d57db79
-
SHA256
49b2c015da0851a2ed43820799a7bcda08e1bc5f315e107598f87f4b1bd36dac
-
SHA512
176de76618d0dc43f17e2971787666b737d7308a67f40bd2bb82ab4f0d3276f877fbeb7cc987f797e6572ec736c29d8568f441194a45cb5ba8d751bf139ab79a
-
SSDEEP
98304:gYRAasq6wh5OiduKi0yAlWNYrsmekq13pgOtleGlci1D7VaMV:7y5haDbyAMNY4mekmCOtQi1laa
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674288498532945" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeCreatePagefilePrivilege 2776 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1896 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3680 2776 chrome.exe 82 PID 2776 wrote to memory of 3680 2776 chrome.exe 82 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4904 2776 chrome.exe 83 PID 2776 wrote to memory of 4820 2776 chrome.exe 84 PID 2776 wrote to memory of 4820 2776 chrome.exe 84 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85 PID 2776 wrote to memory of 3952 2776 chrome.exe 85
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Roblox.Account.Manager.3.7.2.zip1⤵PID:1844
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab897cc40,0x7ffab897cc4c,0x7ffab897cc582⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1784,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1780 /prefetch:22⤵PID:4904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1392,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:4820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2224 /prefetch:82⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4112,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3076 /prefetch:82⤵PID:536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4556,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4568 /prefetch:12⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4888,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3704,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3196,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4388 /prefetch:82⤵PID:3860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3420 /prefetch:82⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4452,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=3264,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4676,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4956,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4372,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4308 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5268,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:1560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5272,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5548,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5368,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5344,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4456,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5692,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5600,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5608,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:3308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=5388,i,8776596133427781893,11404445604017227357,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2884
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1896
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\1e3e1fec-a9a1-4fae-ba82-00f0d09c1b43.tmp
Filesize9KB
MD568825a53c6fb98184d4b175ea4641c30
SHA176c6a978c534ba76f38989e32938ad7efa7b4bc7
SHA256aecdf231ceacb3c791eebb7a816731038ca8d1698c8458a151ff2f4c536a5cdf
SHA512e5d4ff7fe8fbe1f1c86dfd2f1681044acda18a75916020b658374605522d2559a04eef51d45a0a9c8b38baa03f232e0dda1eb743b15d92da62bc9e7fa9a6afc4
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
19KB
MD5d7434d7de9609f718ab801e91cac1d4e
SHA136a41e3bfe8be552ca41e5d65e51f4797870d9d2
SHA25628a82a129890e5e5d206c26b4ee3cc67cf7061fe6ff8b4b93a1da07c73220977
SHA512b80e2a9c7bec321a8b3727f0777e1a3709f41bd67db92e96f5cab5eb8597797f9ca883567dcfabfe2fe88491f3ac9587ec2d4a709db135cd3353ea3c9df85401
-
Filesize
361KB
MD5bc9b5f37144c2979e06500d44317493e
SHA182b000cd5ec2aa8aaea6f5bf64e9d3ddd9706fa8
SHA256665d6e80817bd03c0dc1d67628257f5a5ee2cb4cffb1d04c1819170294312f4d
SHA512fbf86f4f88f6966153b806a26fad50f331de1f9b4fd2439b2ccb3af8afc0482b69d9830873634b4f2e23802a420106c41f604d01063c6c07c4fc47ba2e506f63
-
Filesize
280B
MD560baa6ea4cc921c0b2139c80b39a634f
SHA15bcaceaf953822074aeb20c7bd8e60f4f8432fe7
SHA2569898b99f5abb25eb01bb22cc6802a3a049e2e694e612ee368c57333910011774
SHA512118dd3a1dcaf8c4d5861625e1647cf078a6cc6c5dfe72159d72a66e87735f2d0476fd2f75c8622a2aacf7c6f9097e6bd3adf0ecdc35fa7996a6f8d87300f8a98
-
Filesize
289B
MD5e4f82171d60f2cd95170c3b65388e1f4
SHA134fc8bfd0793481bc8b554cab44d4e5537b482e0
SHA256defbbb6857a5d064248cda55ef7bcf2da0d0b643128df8c90024b1003e869655
SHA512edd8479a6e87f128f0369b3b88146ac5840e3305dc325eb86c7028f41d643eebf4433c99a00e3c4969492b7c4b79809f32c2dd248da75de0b3b33dfabd9e9b03
-
Filesize
2KB
MD5df9d905983923780f45feb09b99ac7d9
SHA12b80a3f020b4d29ad60b98c8e990ef26658e9d68
SHA25618f409bc916a5b71a4763cb08a4b67e44c173bc85e6f045466bcf52f35278ba4
SHA512531fcc8b121d770898991c1d377104e963fe764400c876d172420581c31598dbc9725bbc0ca9e4db62cc80abb5477de13cbc437eb6cb33ed0ac05752c2a73b2d
-
Filesize
2KB
MD55f5572b0a489eb2fdaf097f63256210a
SHA1859ff80f4a5e0dde80b49cda2a16ad0b62c7ecb3
SHA256aec45da3fb0332e6d1a30e30a2d51e30f22f54a587542179c6df34a6fdf21450
SHA51247e6f5ddba3092a95333b9391da1ea810f0af8e327d89ae88589f5865db373a3d516f14141580484bf18e4d78b16a67c750729da5cb0594fd3840479d43a3845
-
Filesize
4KB
MD5dbb6fd4b932ab83e5c644abc3f2c1461
SHA1fb024ce49755decea7048c6ef26b1eb4640d8eac
SHA2562ef0e1a8d6c2a2da09cf3fa84dec668596375a6f92993ff1f4f505c0e369786a
SHA512d2681992c1948c6cc81fb7b3139253e5e218a62cf6e8b0a9d047602b1328dba428b552db5480fb8ed7b0486cc4068a7fdc032eb596de96757674866fda866c5a
-
Filesize
5KB
MD543757850d50b7835df7bdfdd2d605d68
SHA1add5f664e8ee439bb0a8ec6ae94c1f9bc132aac9
SHA2563335189fa30d16749b913b67502fa37db24cfcca0ef9f4b2c2aa3432ee56957f
SHA512b14d0b04438d091f985ef3b19b3f1512039d0ac667ac4250604383961f62e882868950302be3c880bf922d78d44eb5eeefd6089e521c21f2f7bb8cd618548803
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD53d8a12a679b0c5d978c3bd24f6dd20a1
SHA109207d5177c245330780e021cdfcc8e48ebfe638
SHA256eb2700ef34a33e5376157f3b8482d37011b79acf50f0bd012331aec07deafd6b
SHA51275ad7b23f40f2e8b4f4bd1bece506aac5fe30d97bbb5c69faedf872508e7fccd68d42f240a7563af618796ce85d7d114f54472225bc399734843c5329f256732
-
Filesize
356B
MD59b031267dd2a42608a3639da6f5e696f
SHA1f913996a9e726ba966dbdd386120de0a44f5965e
SHA256857c943e48935400b4e3697ed19a444ab0c1eb84e5862ba07212de18e1c186fa
SHA5123b5d603b75893b4c074584722f490170ad103abf26d2f774d33a3c764494834c97aba6302de9a8f6397f162958e31d6b11e1965a1a4746ba0d7f84a6cbe09c71
-
Filesize
1KB
MD51f7378174d51e6eaebab5cfa12260088
SHA11b5e4b6709ba97e08cd55906e89eb32d92f8a6eb
SHA25639046522eca78ef489565d63c488af623aae5f91a79132293b52dee591b5fb76
SHA5120e001782d5be6dc730261eb2ee3d4241962606a47466dd6207c917436dc5c43f2f72a1afb29c8a4d3f9251457f994766a565f7b747ce87de8175afe49417fe90
-
Filesize
1KB
MD5fdde7ca4a41811c54b52747ec5cdacfb
SHA1c2d7dbb1e7abdf6ff2d9e86bee624a28edbe078d
SHA2562c3b6cb535c45c3fa4cf8d492e8af14c9f7e3b1b15f66d281c622048d4720d5b
SHA51249dc74670a916f0cdb7f018f63489542e654c094adfe62c33268b3aa49f1e048fc6e3abd8ce33b0e29be7447d27ced4596d202e0e1fe10e8900c303611bdf2c1
-
Filesize
1KB
MD51a30a50b3c87c722809c9366aada599c
SHA13a789df31724c33e026fd38d3ad0ef8ee89669cb
SHA2560e9cbda622c818f03297cd7691ee6b22a3272b2a030aa82701f54d91bc7e466d
SHA5123e7ef54601637f904da5edf9eef6cd063796f8100b010721a1b45173e586d5ccbd4ce88a674bdd1bcb845719094f8ae4fe86b99b1f281fd7a5220f454ee71717
-
Filesize
9KB
MD591384eea6e1f4a60a8c14cca1f5c51b6
SHA15b2ed491fec47024016216e4db347a05be9d4dd5
SHA256629d3674dcf112f18c9ad122ad2642c2a532889d3c364b1a2516e2bd9a644551
SHA512589b8f0527619b296ec9c6a4ee972edffcce46aad773259835db609f31ac9eae5d8bcf8e0cc066208b0ed5b8df43fd3ebc4770527d821ac96564aa26ee0d048c
-
Filesize
8KB
MD51b65eb3e539f41f4c5ac07c572380fb2
SHA178b89f30dd96193479a08a14c5dff01e10c75e95
SHA256ca9503e12499dd9e751ad8965315bb9aff27fc4ad40341ba3575f69f250872d0
SHA5123c540f1c8c65396905d0b3c0f7331707be3afa8635f751d49884cc2c8845752de984b6ff202044dcab113b763948f62a11befebff779d0c5aea8922ed7456f9f
-
Filesize
10KB
MD572b5a0d3d9eb6171b795a99c1b5fe328
SHA1ef42e0bdc021ab316e1f25d01c1f9eb19f655a5c
SHA2565b9aee2a3b48d7bad460bdbf274e98025ebed6d95dc87a1277ce4703425c5557
SHA51224b0eb29e1ed6d42f35d4e348d0382f1e7e25b9c3f9ff27201e3bf8f857817f5bfe870045b86b2511e30c6fae29b94f2d0209df8876622e84dad5c283924d764
-
Filesize
8KB
MD58a9dbc91b071cbf4348ca067a831e686
SHA1e7402e36c57d9263680b4b71f20b1169379ee7f6
SHA256bc89708471e5e51a391589300d4a7a29152a07ce7913dd0cd4bea0e538fc18cb
SHA51244e4e0ece44000fabfa62f11da2d54a7af01399f234bf6330ad081e92c9ce559d44ec65167706781f6c22e67dbc311fd4ca301c446939a2b4859d34543b4dc3d
-
Filesize
10KB
MD5b6af77f8392489eca1b62ebd01e37f10
SHA13db6868543318eeadf770efa02d1f694c8c63ac5
SHA2560ff3126833a8690d7249f149d6ea36d5927036aca2668e2f77e782561f7fef63
SHA512e27f3175ba90d486d157dd1577ee146cf4ee0baa8eefcda178dde4b6a37a6de1956659a7fa98cbc7ff2fcb69957b9f0813a00de86e34cd8b0f24bfac29664854
-
Filesize
13KB
MD5a760ea1ef1271531a4d91de48e94eb05
SHA150c44bc357d3085d6f76671dce30b3fb96fe75dc
SHA256dff2f85ff3ebac4925265166ed810e31d050f7d71f92dc05a53a6c978f429596
SHA512c1ff4974c3c188fbfab64408008727aababd8fd7cf72cdb17f8ec24f1e536c93f2ee9d4ea9f9c465e42b3adc8d690f5d47ca21e4d02ad7a11d9040ba47571f42
-
Filesize
101KB
MD5a2a803173b94616de0ebf5aa6aecdc57
SHA18278a7f83752ba07fefe6b70a552baf553d66240
SHA256f97c67c401922fb3b8c155ae0770e451779966bd379bfdab170e74077105dfb8
SHA51265c8c2dc8121454ab0240da65c609a7e0c9012c76484a605d91e25c176d551e242034647a08c5dd5b014350ac13e2f70a6da490f0efaef7d68d8601760441b1c
-
Filesize
196KB
MD50939fe16f5c95221fd54b87549615b7f
SHA12c99768051285929ff785abaefc3fb04f565f3bb
SHA256382c3dbe43a5255ef6f8278fd190efb9581826aee3addcd7ed46c80e99941c78
SHA5125b687fbe172acf56ee2b6423b9211e401a634ee7c30dff30a1b81a3f6f9d9972c197191784960adb79b51fba00db0c28be1ff1efee4fe3d85017034dee72c8f5
-
Filesize
196KB
MD5257e111326f9f9dfe756a752941467a9
SHA1879acd13f9448709f29aed407f05e3ae43d047fa
SHA256d87de59eaed8756735a1f39ce7facb1c5ceeed1c7c9e2068d5420c97ef3363cd
SHA51263d99574276855a4bd104df459c921540d94383b133ba7b23ebea2fb887a99290e19e6db20fbb760850ffcf744541370eee4ea606d48c25f111c92a4f664bbf2
-
Filesize
225KB
MD55accd92e02a8c69ad2d0f0c60737aeaf
SHA1bebb2e8df3c213c1c1c674d2f52cc2c731585fd7
SHA25671b2dcbd07e2aa6cd39fe6cb2b4481af8788256d0970ecb43a7b008155dc0852
SHA51209e6e5ee4af30f689e574e8759f8952fd7f9c445d13ef0836d81ba58b218296f5460429120dac6b8a1bee4ba9eb2ade7d90b67ac74a4a3052893d0f491be7c2d
-
Filesize
217KB
MD5ac40948bbe00f0448a5a77bd966f887a
SHA10ff391dd87e904e74b56428e2c50e87cbc4dc783
SHA256cf71d5badf10c5db9ef1d15d4556b89e800d99131e78e8c7c1efb0f15b79634e
SHA5127909b0add59037a865ff8b73473506988ce4377aabef903d6c9adbb784c50d1a2c4ee72dc9a39ede7dee0644932e8b48569f4412e9c15f7fc88035e5c0a2cda1
-
Filesize
196KB
MD5873f10914087c027cb58a01215c3d2ad
SHA1bf0538d7c31327aa2305385cf7220036b99bc06e
SHA2567d77c6b26446f11787bbd001f0faa0ebd6049fe04cdc3cc57a0fc077b3dfb220
SHA5121bab18986a413eb91ccbe866e69a045e40a5c792a7882dc7f4c712ac58fd03594d611d6350dd178e7789e5a5772e93f685a1c52261c716e04a1349df1a0687da
-
Filesize
196KB
MD5be182dc5ac5855bbe50016f286e013dc
SHA16151ea3485e517feb8aaa5edcab4b64dd45a5685
SHA256b058bff941d73ff8f74623ecf324576b5df38d748dcfcf256e5bb411c338bf0f
SHA512ada665c0fbc26e6d8433ffa5e0a31e786e8eab35e727c7a07d649f20e01aa92e6a76a53c25df3edbb0f4aeb13be91262433f2a502b0ca2b8eb232e610b80fab2
-
Filesize
264KB
MD539200f6a34df399f3d72cfaf30cd1023
SHA1a6ce989e738836a1ad43ba10b37015db5220eafb
SHA256765f15777992d6795286369a63cdf89ea85a3532da3acc9f5a52a0d97be2e078
SHA512837c3ab8c30ad005d34f02288d9156b9efbda1cfc889bd7d3ecd4d34f697aceffcca1221a02814a461a7e01a52c64ac66b6875566294d00e8c49e6609653a841
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5d12e797f18cb79137ad12b5e5139e1b8
SHA1f15fb437b1be86b714e278ce927b315fa0e16ea3
SHA256afb0f4a0229174f8118ab512b569fdb9eb3ebb0389cb11c9f4a0a2aa88ec258b
SHA512f6e8f99bcd0ecff7683c8e56fa2ffa3fdff16d6c17a2066b36bc3d78e2838130b5b23059a239b29a7ebdd0b5ca36b3f9cf388945bf1aad50a3f91cb8091223cd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD5053918bbe82155f74c1b7de17b215bbd
SHA1857914730959b36acd6582cd006697aa0ef492f5
SHA256d8e4a4a43a976635df2754325890ad3547e4bcaa5f45dd07b970099cc661ba3d
SHA5121f7ba04317ac8e4d010459e3a46c4e6a9f197c757f4a67d088ec423f504b9dd246b315b7b8ee341e739410b4e3100e498cc6dd5a9281b906089b348907668d4d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize12KB
MD5e03d58aa6f7e7c9ebf074ed09ae80cbd
SHA1df80358a253a73470b65c773da0da2b67a40173e
SHA256d1a6bd56ad374a88e775d616ece54d15c59ea8396402197e706d503cab5b5bb4
SHA5128d22e922fe7c97cf3cbe4132c5cb2a8e495a884bdd949b66c8981ef6f8d3bf8945bcf9723b19120fea253b81988b0dc85dc1578360c3cdf455a0a7a1ae91c80b