Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Sildur's V...te.zip
windows10-2004-x64
3shaders/bl...erties
windows10-2004-x64
3shaders/composite.fsh
windows10-2004-x64
3shaders/composite.vsh
windows10-2004-x64
3shaders/co...e1.fsh
windows10-2004-x64
3shaders/co...e1.vsh
windows10-2004-x64
3shaders/co...e2.fsh
windows10-2004-x64
3shaders/co...e2.vsh
windows10-2004-x64
3shaders/en...erties
windows10-2004-x64
3shaders/final.fsh
windows10-2004-x64
3shaders/final.vsh
windows10-2004-x64
3shaders/gb...nt.fsh
windows10-2004-x64
3shaders/gb...nt.vsh
windows10-2004-x64
3shaders/gb...ic.fsh
windows10-2004-x64
3shaders/gb...ic.vsh
windows10-2004-x64
3shaders/gb...ck.fsh
windows10-2004-x64
3shaders/gb...ck.vsh
windows10-2004-x64
3shaders/gb...ds.fsh
windows10-2004-x64
3shaders/gb...ds.vsh
windows10-2004-x64
3shaders/gb...ic.fsh
windows10-2004-x64
3shaders/gb...ic.vsh
windows10-2004-x64
3shaders/gb...ed.fsh
windows10-2004-x64
3shaders/gb...ed.vsh
windows10-2004-x64
3shaders/gb...es.fsh
windows10-2004-x64
3shaders/gb...es.vsh
windows10-2004-x64
3shaders/gb...in.fsh
windows10-2004-x64
3shaders/gb...in.vsh
windows10-2004-x64
3shaders/gb...ed.fsh
windows10-2004-x64
3shaders/gb...ed.vsh
windows10-2004-x64
3shaders/gb...er.fsh
windows10-2004-x64
3shaders/gb...er.vsh
windows10-2004-x64
3shaders/gb...er.fsh
windows10-2004-x64
3Analysis
-
max time kernel
124s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
Sildur's Vibrant Shaders v1.52 Lite.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
shaders/block.properties
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
shaders/composite.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
shaders/composite.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
shaders/composite1.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
shaders/composite1.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
shaders/composite2.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
shaders/composite2.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
shaders/entity.properties
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
shaders/final.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
shaders/final.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
shaders/gbuffers_armor_glint.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
shaders/gbuffers_armor_glint.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
shaders/gbuffers_basic.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
shaders/gbuffers_basic.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
shaders/gbuffers_block.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
shaders/gbuffers_block.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
shaders/gbuffers_clouds.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
shaders/gbuffers_clouds.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
shaders/gbuffers_skybasic.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
shaders/gbuffers_skybasic.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
shaders/gbuffers_skytextured.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
shaders/gbuffers_skytextured.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
shaders/gbuffers_spidereyes.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
shaders/gbuffers_spidereyes.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
shaders/gbuffers_terrain.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
shaders/gbuffers_terrain.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
shaders/gbuffers_textured.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
shaders/gbuffers_textured.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
shaders/gbuffers_water.fsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
shaders/gbuffers_water.vsh
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
shaders/gbuffers_weather.fsh
Resource
win10v2004-20240802-en
General
-
Target
Sildur's Vibrant Shaders v1.52 Lite.zip
-
Size
139KB
-
MD5
ceba4ca74a1e49636cfe96417cadf790
-
SHA1
826348183861fa0b1ec9476ce9f131bd2ffaacdb
-
SHA256
1d49d456b2dad25cfd3a85943992bb0a20ed39ef9a4430a6de5a0fe094ca9a49
-
SHA512
81c4c4adb7377a62bbc3d292a4c9b661efdfd019c3f82d13eae6e318352d481f8130b369b60afcc21bd851a842abb5d8586c4897a0fef0b215af2b5e867ea3ae
-
SSDEEP
3072:dX49um9zr8R21C2dtHiENQfNZQZ213RQw0TC91:dXA9l8IC2bilMWyw0u
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133673177180327269" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 644 chrome.exe 644 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: 33 4700 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4700 AUDIODG.EXE Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe Token: SeShutdownPrivilege 644 chrome.exe Token: SeCreatePagefilePrivilege 644 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe 644 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 840 644 chrome.exe 94 PID 644 wrote to memory of 840 644 chrome.exe 94 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 808 644 chrome.exe 95 PID 644 wrote to memory of 1760 644 chrome.exe 96 PID 644 wrote to memory of 1760 644 chrome.exe 96 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97 PID 644 wrote to memory of 2968 644 chrome.exe 97
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Sildur's Vibrant Shaders v1.52 Lite.zip"1⤵PID:4088
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1264
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9bc84cc40,0x7ff9bc84cc4c,0x7ff9bc84cc582⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1944 /prefetch:22⤵PID:808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2216,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2272 /prefetch:32⤵PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3748,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4512 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=4760,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=3536,i,15955508800524121144,12218174943173160793,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3184 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:720
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4b0 0x3981⤵
- Suspicious use of AdjustPrivilegeToken
PID:4700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD589f10307a4e87f78ad0b6081cd8e23f6
SHA1a26e92f89231b60cbd742d0a259d63eebe2388d0
SHA256dcf169dc4a6449c4cc490dbdb448505ec91dd219619f32496100649c259388b9
SHA5125845e6b34d0effafa10ba9c5eded904c13af64128ce3a152a3c2cad9c6fa38b7358916a0948eb6288c9c9ead23bd5195e16c77c49971fb53d6ceabc1e276f0f5
-
Filesize
202KB
MD59901c48297a339c554e405b4fefe7407
SHA15182e80bd6d4bb6bb1b7f0752849fe09e4aa330e
SHA2569a5974509d9692162d491cf45136f072c54ddc650b201336818c76a9f257d4d2
SHA512b68ef68c4dcc31716ce25d486617f6ef929ddbb8f7030dd4838320e2803dd6dd1c83966b3484d2986b19f3bd866484c5a432f4f6533bb3e72f5c7457a9bb9742
-
Filesize
168B
MD590fa42e4c09aebbfc97070ff176aaf50
SHA17f949387915cc8e273cad6c7f2bfb1a650b61c84
SHA256d866d43320cd7a3b9327cf5509e5986abc7a865e9423e90c2d30d4113e19e8dd
SHA51220eef02c4a5318d71dc31671fc7979ea4dd26fd3bc64487b9c39b72ac7bf266336d9fe8be8ed2393e0205c8835f20a1a5036dbae4cfe17d123f605c88814fb65
-
Filesize
1KB
MD523004e293c9ce5a572a5b0d902a0fc27
SHA18f2d1db6646320cdb080480d9673f90d988a5747
SHA2568b17c0affe5469ad3d312e5ef1efde66b73247bf7df19d32b510bb2cb6152042
SHA51203a4b4b5e3400202c948b51d81e9eebbdc888f16438b81c955c6ad11790dd54c75d0cd713aee41696d6d412f31a312e8b045706189ff3a96986cd46c07d46455
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD54f668d01b230fff157ab2663b09baebd
SHA12b9ecbf124c7cef1466a5c75c24097aa37478487
SHA256816f74096871a7fe4b125cc7ee8603e33baa153ec7fb547d9248a69deaa02522
SHA5125a66e0a1391aaf9783aad4d922da34537ea791946c36e69a4d443bfe11132e1e32a5df479e75cb7709ee1f2a9b6bbe5cdea74e18a9d7bdd21381d5b34a9823b3
-
Filesize
8KB
MD543047830b0fd5c81b963741790535dec
SHA14418933f6feb1843ebee9042127ff84d79925899
SHA256a03044922d330e0612199c66e322323b0cae4d4f0e79ea70d8e35565e211ad5a
SHA51234341bbf1f8a68f52d3c756df90bc4628ca6dd2ceec301ce91a0ef20d54b34e90401bffcb89550b80abefc6b0c03604348dc75e1284212f3c5486eb20e706bf6
-
Filesize
9KB
MD5a1b415b5633c9a3a11fda80f205f01e4
SHA1a8d8f5ea39c11c0807a35902870ee3b64ea96938
SHA25632dbc8cd6cfadbfc8b3369c9bb6577c2afbaff99fe8a90280956a414e1c83579
SHA51207262740733b87d0d19725ea60c5da528330cf7f2f901410c61264d6488b4916fda7b467b2dce876fadd6f7b782f80de9b80902ecfb39548a4e808dd5afe03a1
-
Filesize
8KB
MD557979a372b5f6a8c7cee3d675e8f62e5
SHA1c5ed6231a92babdac57d876b92c0f221a96dad73
SHA256f64376d761f1a625f8788375b656d6787c67ca3cd4fdedf3168c27c4f12a2f1f
SHA512e0ed2e43119f83694641a9d8fb0f46479a283ed81325057ecb8dd64117432df69d9268fa75fed10ab7a5b389b2bfb989e8e182f0e6e38e7d9f139a5d4a196960
-
Filesize
9KB
MD50ebc6e09614253f091d61e36509064aa
SHA148d0129cdc08ee9c23c75f3c255ece9f9b37dcc2
SHA2568100d7c7f57218696547019031e24f3ee20aff08e7dd6822d234c5d2f924f7ec
SHA51287d23b1874ffc1ccf44d34b6f8163583d74204ad7e02a0121b3eb49eb12767e1579e6ce63750c096aa1c7ef139ab0d64b299cd245a29de9929345b9eb47d8268
-
Filesize
13KB
MD57e50bf61ca94d28c75d14879d3aebca6
SHA1886ff0dd3351b1d8f50694c3c8e5fe46ad673968
SHA256ae37a0ffe5d9e89ffce2d066a9c706b20f4b982a642e82eb140dd4bfa83b7e3e
SHA512546efd75121c43e626c00426d5afdf3a13a379e05796e4d576afcbcc8b862daf9ff92679b3e942a1d723a1bcef4557f4719a7642b78897eea8ce18d55d716e30
-
Filesize
194KB
MD5f1a3ec1ccc0f44271c3d67860cd95c77
SHA1fb7edc69daa95eb2fbfa045521a01342f3df3cdf
SHA2569a16bcd022543bb3bc15968dcbd8a32213ae0eb7bd703369ef838b5062d841e6
SHA512fd623b4cb27c1adb74895984d6dfa8716116b3e00ee9c329759ae5dd829e3b760fc704294a6737381b41c89873a30e45fff683e2b38ef019b62c93ab8a181a87
-
Filesize
194KB
MD5c650526151b6b15b396bd22f21648bcd
SHA15c9d74fc1bc42b6389a4d0345e13c54882394395
SHA25675cf8f2bbd37ff2e7d69945c816d54e33ce3d57893ec0bfba8677a90f2281a73
SHA51260e82c220d2feff7411216b6ef411eaf2569fa4cbf35ac5240b1c461c3a34121c4ed7e337f78b71d653a4a8fd84b640caf972f57f68ebd69d0eccce870b68737
-
Filesize
194KB
MD507ed7b37ed71c116bcf914399e6f9c12
SHA1e06c7473574edf5b3f5d306123809e07d8b80133
SHA256d5c9eceeeea7b6358ca4314e54ea21ac3bac9bb7f1c00ece824d1b3a7143cdef
SHA512a69855043c3f0f5288185b8cd86a7abfcd4874ee9478822cdd7e001a0a47c8a6a48f5bfbac00a2e8171d3cbb722f44c45332fd452c81d65e9e61fe070a767fb6