Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
3MixerLapx ....3.exe
windows11-21h2-x64
9$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3LICENSES.c...m.html
windows11-21h2-x64
5MixerLapx.exe
windows11-21h2-x64
9d3dcompiler_47.dll
windows11-21h2-x64
1ffmpeg.dll
windows11-21h2-x64
1libEGL.dll
windows11-21h2-x64
1libGLESv2.dll
windows11-21h2-x64
1resources/...dex.js
windows11-21h2-x64
3resources/...pi.dll
windows11-21h2-x64
1resources/...act.js
windows11-21h2-x64
3sqlite-aut...llback
windows11-21h2-x64
3sqlite-aut...ace.js
windows11-21h2-x64
3sqlite-aut...al.ps1
windows11-21h2-x64
3resources/...e3.dll
windows11-21h2-x64
1resources/...ing.js
windows11-21h2-x64
3resources/...te3.js
windows11-21h2-x64
3resources/...ace.js
windows11-21h2-x64
3resources/...kup.js
windows11-21h2-x64
3resources/elevate.exe
windows11-21h2-x64
3vk_swiftshader.dll
windows11-21h2-x64
1vulkan-1.dll
windows11-21h2-x64
1$PLUGINSDI...ec.dll
windows11-21h2-x64
3$PLUGINSDI...7z.dll
windows11-21h2-x64
3$R0/Uninst...px.exe
windows11-21h2-x64
7$PLUGINSDI...ls.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...ll.dll
windows11-21h2-x64
3$PLUGINSDI...ec.dll
windows11-21h2-x64
3Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04/09/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
MixerLapx Setup 1.7.3.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
LICENSES.chromium.html
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
MixerLapx.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
d3dcompiler_47.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
ffmpeg.dll
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
libEGL.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
resources/app.asar.unpacked/node_modules/@primno/dpapi/dist/index.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
resources/app.asar.unpacked/node_modules/@primno/dpapi/prebuilds/win32-x64/node.napi.dll
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
resources/app.asar.unpacked/node_modules/sqlite3/deps/extract.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
sqlite-autoconf-3410100/Makefile.fallback
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
sqlite-autoconf-3410100/Replace.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
sqlite-autoconf-3410100/aclocal.ps1
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/sqlite3/lib/binding/napi-v6-win32-unknown-x64/node_sqlite3.dll
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/sqlite3/lib/sqlite3-binding.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/node_modules/sqlite3/lib/sqlite3.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/node_modules/sqlite3/lib/trace.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/sqlite3/src/backup.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
resources/elevate.exe
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
vk_swiftshader.dll
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
vulkan-1.dll
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
$R0/Uninstall MixerLapx.exe
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/WinShell.dll
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/nsExec.dll
Resource
win11-20240802-en
General
-
Target
LICENSES.chromium.html
-
Size
9.0MB
-
MD5
f017c462d59fd22271a2c5e7f38327f9
-
SHA1
7e1bbeea6ac2599bd0f08877aa5811d32f1aceb9
-
SHA256
40f314c778851106918aae749d75b2d913984327602a1bfb7ef0cc6443ff2a37
-
SHA512
72177281486f6ec26ccc743b43481c31470c7dd53f17b0a67ac087dded190c2e3dde5570260150c2e9650186a515740af7f81e31965c95bb762340f9ac100c07
-
SSDEEP
24576:G8QQf6Ox6j1newR6Xe1Vmf86k6T6W6r656+eGj7dOp+:fG6eGd
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133699491048693512" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe 1864 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 6120 chrome.exe 6120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe Token: SeShutdownPrivilege 6120 chrome.exe Token: SeCreatePagefilePrivilege 6120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe 6120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6120 wrote to memory of 5848 6120 chrome.exe 81 PID 6120 wrote to memory of 5848 6120 chrome.exe 81 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 1436 6120 chrome.exe 82 PID 6120 wrote to memory of 2504 6120 chrome.exe 83 PID 6120 wrote to memory of 2504 6120 chrome.exe 83 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84 PID 6120 wrote to memory of 4780 6120 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3794cc40,0x7fff3794cc4c,0x7fff3794cc582⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1908,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1904 /prefetch:22⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1380,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1940 /prefetch:32⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2064,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2084 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:4196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3068,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3124 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4512,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4740,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4776 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=212,i,12974583232140884472,2835130689002398140,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4668 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5df6bbbf266252ba17d91f509afa34df1
SHA110069595faaaff212f22930ffd0c86267cb79de4
SHA2562c5f097e9527dfd98ba2d60e3e0bd01c4f7e09fc06cd8af4ef07c8e46ea8dd14
SHA51209c04072b84f89d206fbabc07c31403ce2facfbe2e4094ced9afa7661c4cc13d873fc82a900b81d36fb95dc17d413669ed13964e85659a588474ae719d39cc3e
-
Filesize
960B
MD5bc185021708a8b5f5ec6b1ae94f0d1bd
SHA1ad2c2abc25552fa4615db67b9f9d75600e42c87f
SHA256100b26da75798b870fa85819b7e15dde6847b910a29dac1c3c7f7bc9e23e47df
SHA512ac93f31f98ae56bf2a1dec2c5072cf5a6d68d8dd249438722240dd933fb18c7aeffdffacab11a9e2a850ab69a66dd4f1461d3b02266308de89969a29c5650a48
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD50751e1291bfca7ebae5641a133b8fac2
SHA1c9fd7d485c42df9b3fb6a236d25e38949e3b479d
SHA2566731f9fb477d189f830ac4d638c3091167e90a77a5ea2e6981d98c4351d94ba6
SHA512755b9c1332d1308f62114b966025563339960a62dfcc79b52c2f00d46331606e6352a042551bf4f4aa3a685e408237e692064a3b040124562b96d305a1a7a406
-
Filesize
9KB
MD5b84c37f8177b196013c8add49f754ab1
SHA1f04c3e8b2d56a2fd5146458afbcd75c76c17cbe6
SHA25673c254c1b717de022b2c94b39e1e25afdd6bf9a3c434cd55a9d60fab87753cf5
SHA512c7bc005a5acf5860b0ee3e7b6b6cfd6ee2562a18567662cd696ee4109bb41a14251645c1738ba9c135495799a9ef355d50c0aed1a437f7267a3ede9eb28c8a28
-
Filesize
9KB
MD57e559f6612273f01576a09883e7dbb42
SHA1d492515946d0b32269a64d04ffbcfdb21c25ebaa
SHA25609c3212dbd56e422bfcd46cc190f8de43290db5c1a030dafe7f9868dc5085d28
SHA512db85b7226157a9bcff5fbb7afc45c6267398d11a0cf857d0c7851d9c9cdc408f7ff3b3c7af48900cb05a500925d4d8742639803a37fa9eaa903509db1889d057
-
Filesize
9KB
MD55d5dbb47254fdbb71869930230bb7f51
SHA12f09a4d17c89ddc7edec0de9684267568fbddd76
SHA256d185563139e915bedcef9c76d42e30e63abeb75b692ee37dd67ece554979cec9
SHA51286895babed4938e647297f039c8b3cf587296f94851aadddac826e3c0b3f1f7e7061386f21b9dd87c79c9e88f2e70eee1fdf03daeb9956167905ff177b2145a3
-
Filesize
9KB
MD5fad5d6be6e04401c51e283af71da4a6b
SHA10c20543b80f9fffa8b769dc2506565581ee99674
SHA256923e0b96c693d9c56b8ac67bd827173c4ef2a2a073e770fb7316e6c36b186e7f
SHA5127ffcef688ff9230d65e9e1aeaf18233d3c0911e1b8e4d5190de8513f03080e8ead82d03f57408c5518e661fa4eec1678644f79f05534134aec52b489388f223e
-
Filesize
9KB
MD5f2df8d891f1625a9c8b0d9853b5fdf13
SHA13c7baaedcd1780ba542bcbbe6e9bb5c159bba560
SHA256b4b640e40d5d5b31349bb909ef72e0db9c32483627f6339844a5121b246c841e
SHA51220b2eec5e8c276f38622a33977d1d3c54576365050d568efab4f175061d59a92fa9155f707bb991a82a57a8cd68a3fbfc0a691401eafbb4e11d371089e287ef7
-
Filesize
9KB
MD531517d9b51fb4b526ebbddafb05cb402
SHA13f52116fbaba6acb0d740eade486b7caeb265d18
SHA256b33b03da39408042bf4980f9195fb8eb2b0a95e856206a2190c2596436477cad
SHA51277213695a9fbb06c1e2681ab2db65ae32b4675c9f7770ade87bf09e29302f29790edfaa2f772cc6961bdbe5949ac7a8ab65ee614903b425af37af2d6866241be
-
Filesize
100KB
MD549b90ee1061c696e86b80900b63e09bc
SHA1c9371296787cf9e98f5a73b42c042db90332d122
SHA256b0f90a02ac5df791f16f4ac34068c0c0504209ed3564a304b7b7678f9e9379ae
SHA512d1b5df386737182496a0c6a7d13f032ef7bc1c2f92ce94b4c717f6c0aabd3b9437ed918fd8eaee87413db8cefc789b3735b9c6943d9218bc52bc66304dd43658
-
Filesize
101KB
MD5d1e947f1e44ffc36496e9ba5255bb7ba
SHA15d8077adc7af3e08b0609016a74543903828a51d
SHA256fe6d4f4470e2c006039b948629b5b9ca971e15e4094876b4bb67dc0d90bde1f2
SHA51288f05a237a9cfa8057519604669590b257557c21584ba056357edea285edc010a749821db8665f7465750c2af5b7821ca77934d1732d4f141f07ee415582d359
-
Filesize
129KB
MD524e475f2759052918c4c719b8647bd95
SHA19aba4d937521843ed394191c407c13272fe46a07
SHA256f91ff5cefdf78b1a75ef05b7c455183fc8ce4ab9e2a5c16fcb7ddfa6ec2cf839
SHA512453d60dfe7f5a40aebca08ba67df365027538c64eaf5939127ee8437fd59953f4611b9fcc9414c180cdf3d507f5b23ce1c6fec08ed8cd3744798468483daf43c
-
Filesize
101KB
MD5d3c99f266dbe533f80e9532f76d8dc89
SHA10dc1828da7bff8793edb97cdfd625d7469057d0f
SHA2562fed9cbbc20fd22f3b769e3f3a97f209bcdd61ae0c9f9de031d6130223e55ffa
SHA5122bbc11006edd58c2737e6502cba392ba6375cf140682b5305ec16ebbdd0981083625042f2f7be57004a221500a37b011f774826e7ea72ccc11afb65d0d46dec0
-
Filesize
101KB
MD52e36a0585f0340b14a6147d794c9c23b
SHA1ac7ac4572d0644c2b827152c81bc2cd0f8be0062
SHA256850f22f6902729a34ffcd3495995a405dd5be49ae5c46ebee24e1f31c0b7bb22
SHA51269f86a0e3886f11f6e59ad3dd4fdbf96c6c7942248f5a0e9abc9ab06c53cc976da2cd4c1b4d77709e98772faf874ddc6cb85b2f3ebe5e24a84f67e60a79a5a85