Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
-
Size
36KB
-
MD5
bb9e1d92fc25605e12a62d9ad850c1db
-
SHA1
306a96698d44f8815d2e4f231000f228305f0019
-
SHA256
e81b2516bb8192c4d6e0de1f42f2d516cf8988d0e0b31eba24df15fd2000e2bd
-
SHA512
4b5d64bb6ca5905a954e44e31bf51b62b49e195cb0429ef16529defc0baafff0168767a916eb34d8a60dee51f07b1c15e6f57d3f2fe09fd1021e885146714c6f
-
SSDEEP
768:shY/hDYsf5n1X/Rc71gcOz0HWSNAEfUweo9CyYOZ4RUtX:Z6sfJ1PW71/1HWKIs9HYO4k
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679431062751139" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe Token: SeShutdownPrivilege 5068 chrome.exe Token: SeCreatePagefilePrivilege 5068 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1456 wrote to memory of 5068 1456 cmd.exe 83 PID 1456 wrote to memory of 5068 1456 cmd.exe 83 PID 5068 wrote to memory of 2640 5068 chrome.exe 86 PID 5068 wrote to memory of 2640 5068 chrome.exe 86 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3668 5068 chrome.exe 87 PID 5068 wrote to memory of 3644 5068 chrome.exe 88 PID 5068 wrote to memory of 3644 5068 chrome.exe 88 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89 PID 5068 wrote to memory of 5080 5068 chrome.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IM NEVER LEAVING!\tumblr_ndbos8REDU1qhccbco10_400.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\IM NEVER LEAVING!\tumblr_ndbos8REDU1qhccbco10_400.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80ba5cc40,0x7ff80ba5cc4c,0x7ff80ba5cc583⤵PID:2640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1820 /prefetch:23⤵PID:3668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2096 /prefetch:33⤵PID:3644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2168 /prefetch:83⤵PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3052,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3100 /prefetch:13⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3092,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4408,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3636 /prefetch:83⤵PID:3520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4560,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4580 /prefetch:83⤵PID:3880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=212,i,4186116094756602847,8584459525793390301,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4336 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\727c6e66-00e0-43a5-9764-b4ad3865bc43.tmp
Filesize9KB
MD5dd22e7677d68413da2b7121d654f43c2
SHA18205ec304c132467ed559fe491ed4e1389abc97d
SHA256b89b450eaa8399b959f6d6388fac62dc6bba1a62dabb893e5b05e680f2fcba05
SHA512f3f8b9038d262e12ab3d08728211a85644b4eb81a1e954f3b5f0e88a69e388a057e9a214c332f9a1b6df3c033ac515cbd8f775c80502b28a9217e76b990d5fb2
-
Filesize
649B
MD5a5eb9a7d431578bca6cf126c543c0d6e
SHA112ef4ec0f582c7ff076c9ce9e9ec69b9fe656be1
SHA2567d8d631be88f07a8722cf74baa51e6adcf07ccecddf2ff2d243dad08f3bb0026
SHA5120d8e6a2c2e8c51b8a50f18947cc637bb172d4dd866659d588442e314e7aaaea67c0491a07c423897e82882c3745ea18ed295fc611f643a7e67ebd5fa5f1e234f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD529f22136fb8bf58428250131b41cee03
SHA1c9ba7602d6568285402d18fb15c50707420b9d26
SHA2560b31a4b5a279c2450781c645777991bfe98db64b11def0bdbfae7353670b0ea9
SHA51262554ac26bbbdc7b6132f818667cc11a4b9fda41a8335e85ec8c502ed6fc8a7ffade6ca8e5e646675949a39597b5408017bcc0c83fceb4687777367ec92f54f4
-
Filesize
8KB
MD5ce28e5b05b6483ae0f60c6efb29c8188
SHA1f122f4c6ab42c53c93f20058250389063b5b74b6
SHA25698e8c55492fe348bd90e1beaaddf7aacecf36bc54485d2778678645be3ffa02f
SHA5128b4f6cfc08eeaa966a107f07607ec49300ce4331541ca056595d87294d9482a66064aabbc8e31e7f61ced233cdb70486bc5dfeed134da360cc4c769d3f36c71a
-
Filesize
8KB
MD557fe9a5f8af0860c1a6952911b865191
SHA1e8fae84b1bd19be3baa8b037d2f05756d32f2364
SHA256d5fa70f9583d917300c7e779038679fead29275eb89a60e145c54a93ea941611
SHA512a07688244bd3e25ee58cc92553fe352f57dcd122c66414a3bfe9eb8d6a18f937a68dbaf02fd8a77c1e8bb56c4e82bd58a01fd5f70e95aad656d2ef28e5889ad0
-
Filesize
9KB
MD5a1760f25bbd58c32766ab3c9c56c08a7
SHA1cf5ce6020c05df872d711d9249b1174276ad534f
SHA256a1714101d0a0c4b2c94a711bcbe3b7186df31f9c874e67e289e3637afaa3f91a
SHA512f842fe9fb4c775a39387dcff8036ae18d9fd2e8370b4a7d29a4b3df402b58c54542d6b797848634a6d537cb54000a5941479e25fd367ddd9486a6c6fe227c1ba
-
Filesize
9KB
MD5a08f42b4ffdfb7936d54c2a4e7f0aac5
SHA1cc6f55acf2e7d7a008bbfb07c81209f03e73ef35
SHA25691d591271687514d1c616767299411f519ff6159d37cec14d16f1c81d3b25f30
SHA51278265c244d48f59bc84a378068ef9b3f52ae959fa5e6fa430a3f4242c5aec09de45af62b448cbffb0f3e771ba3024d68e7758b55baf7d066de378cc3af9f5497
-
Filesize
9KB
MD5c3679994b997b6986d87f3dd057415dd
SHA1e536e922b6ac660c3e2c7607a813cab134068e0f
SHA256a817a6bf2921145eea2edd641d88693bec119d05f4946f4a169efc6835da993d
SHA51204e6306f7e01748901c14ce460d1941a4a8c9e59e13605c139cdfb6643a1ca13aa7ab665bc68ccf09e67871ab846d09426c3a8be9573049276b94ef8d44b7c3a
-
Filesize
9KB
MD54f1c42f999a0528b24b662e74590cddc
SHA1d039d6ac66bc82e21c83418af3d7e590ef13e3ab
SHA2567752b8e43e4430934a06c05dbc3aa2660b05df0c9e17557b6bf49af721ba5a3a
SHA512636e2b5120351876eb3ab6d0fff43c261cdd67491da3cdb244f9bd12ca04371a5de431792a52990ac0dd7d115594253670077724e604e799295923bb95c41772
-
Filesize
9KB
MD5970c6a6c4cb6fd9ffbca3ce4f1357e3c
SHA1a4f09d20e5b46a7d5ebc8a216f6958e903be1c4b
SHA256a39f446f7e7c7004c2b1a1e9044af26138c05629fd0135a6392b6031aedf82ca
SHA51210de6f49289dfb5c133a3ace22b4c1ce9c19d2df2fdfb866da05259053f9f9c7dc0b403703f556177a30b245983c4fe346a64a1943fb1a4e3c6d5f0cf1e0a34c
-
Filesize
9KB
MD50ff6d7acca084a298e266f5b7a6ab551
SHA15a9c80cee835de8f60f550e2524f3aa81226deed
SHA256190f79d61ded195a70d31803d53f989bdc5e36332789113304c37c24a7dfebc6
SHA512bd74a899f8f2a89a8193504f66509057be934f5dbf3a0bdce4462df42f229584f003f925480b3f9f93e3096667d8a227678bf6c8e6030d4e5761a25259227beb
-
Filesize
9KB
MD5b3f882dbbb5e3993f06dbfdb36977174
SHA1edc50c852653c40002bdd44f36963781baadfdf8
SHA2564ffbe7764941de9fc7e496f072e112282eda40f1415377db6d91c148979b77c2
SHA51286719d10ab34e2c9bc24b038a52ac7b4f062efb9055d26d7e235c1b11579ac0eae1921ffb9fd22eec3a51b8c9ecfdb44efdd00b5451303e0c6e90c33e173bc58
-
Filesize
9KB
MD5a7410015b77e24d2de71b41e8c852e20
SHA160b43550f35037fcf6e8961bd5a37c1ba1819ef5
SHA2563d7410cb0386b1869c081cc09a81c90e55ac44be09ed0dad3b2f455668dc2c65
SHA512081c3378b974cef56e3a076c4d4b0a0bcd379665a47e2835ac4519681ed8faca6f0ebb74356b9031c3351c99496cdcc2b0084196fda05ce4866b3eaf617f0441
-
Filesize
9KB
MD5f2786deff2108e906ac612181bf72e72
SHA139ad7d2d0e7dafb8271485ec802acfb888da13b6
SHA25690a092a3f16719ed66367fe4b9e6be33b96ebd7c8479daa005b297ace4101eaf
SHA512e1878d500f3a2401cb724c5b72f9726051ae15ab6fa768811e1a1eed3495fbf01663aa90b305ad487a7e117943ccb5acfb64dbbdbfe5e7d5c75dae2e84826909
-
Filesize
9KB
MD525fec4c71b32a98931fd833dd96dee73
SHA12791f2edd54349f1d5f5dd2c36bd9dd709d2a2b3
SHA2568fe1c1419424f1ac65875d75c5bf4f115493b81c0c48bd61bbd020a9bfbd6c01
SHA5127768d9fbebdde5426239ca17e3860b45396047d59b8209f7df401f230580bab57b82a2b6b75466da00c72e263b3578424cf5e21cbf186bca0705bcc0eb67130a
-
Filesize
9KB
MD50e63dd30bdf6f25f01fdb2e901572e52
SHA126add4ae944ddc0059e0e0f2ec63c43bbfc9d1e8
SHA256f10864dc3e10d917a074a72f40bfb1673711088ddbc30975835b79e99b8b84d5
SHA5129b4901f1240e208426cf1ad7051674a85dcf223ce7c5f7743d8561c92e451d860f2e8134224c3f698e168cfaad83c87c374b625b90160e315454eb04f9c6cd18
-
Filesize
9KB
MD51f98315d839662b7dd29dc48f2a2a153
SHA1a2ec2799bb145e545bde6508d424cc416ba03a9b
SHA256c1d819d554ea7d6992a31c3b390ca64fc8dda81dd9dcea676134dc6117635dc6
SHA51252efd576fc8e047cef7b5d897e807e81c461cdc3a940b854069fb4a973a4309f58d9549d7ecada2f293d100cbe597c8186819ea3f97d6cd2a1bc9ce5d536f68b
-
Filesize
9KB
MD530d91672091555fb56b2440db1bea4cc
SHA1881596071b8f6266a44d27a28f5d83f5dbe3537a
SHA256914804f7f10f4b5bc1618ce898e89808ed67f1a1503ae1ca3f86789aee8d5ddf
SHA5127169a13d6cd1ba9da5bd69c167a2e7c7a251481e2a9b77a8bef790f2211ff83c45e702e1733e92822c25f7a7e1cd658951128e655164bd7a66e3e1cfbd5dacc2
-
Filesize
9KB
MD59a8ab2e56d078984d912abeca034f22c
SHA17d72c251ba447318d954c627ed9cb1745f5803b8
SHA2566ee5c328c90900171249cd4d60b4b10ede4649db19ba23acf97898c6b7ad6720
SHA512011744438384e3f4bf665f528f0a1a876047b979b4f54330a13a81298c167901879140184b67fb220dffd1c586494baa7fa98d470c27881a80be30f1c982d7cf
-
Filesize
9KB
MD5ae92c6b66b3984521098b4b0c37b7780
SHA1ba497579ab5af6a512751bb0285ae486a8aec9ce
SHA256a524adfc6923c5cf4fe449c14fda369968e92672b6f321e5f1986899e3584e19
SHA512e95b0d85204a4b2159c92bb081af4998f152ab0981db42e096418f545c3b1df630076a4173790723bc708eab25ad977041d210c9e26c93d57f2d28b769bcb804
-
Filesize
9KB
MD566749befe82aab974d3a9fa940e3b424
SHA1336139938fcbce6ac54cbefcbeb96f8bfd2801e7
SHA256a6a8293c0177b2c0f87abc877e103e13750fa2c2e54e7d6fae5a7c5880e56850
SHA512cc42d959ee7b2be0f8ba2f79bdb804d3421a02929cb13ba596d07113178bc1b633ed15fd4a1fb5c96910a5d642475d8b0ec179f2854378b6265cb4d21b7ab6b8
-
Filesize
9KB
MD52dffe6eb3e7cb9d7614326b77abe3a47
SHA1c0b195965cda820834d11b1d05e63b5a2c5d646e
SHA256ac68d959e224227a994736d9d5a53b48ec3fb72f762c34aeccaebd88e5dcd541
SHA512b19fd5325ac90f1b2674578e7e2ddc6521620bb0f05d040b604652f474549d4e9a3c4bbea64f03d9c80f3759c955e23881720515198c713fdf6441bdb1512f01
-
Filesize
9KB
MD53c252a775c3698e638d122f630092311
SHA161ffa49551b1f681c53c4410dccc4b4af01f342b
SHA2565626d4c198bf621a0c231153c2348f1d8cf949871ba4b2181921a350db004917
SHA5128ced374d4c4b9585c342c89869e3c89a5fd48cc22f1a497f6f0f4f13b0bc67d92eabd05fae7953bd28631dc51f294daee5b7f99d89bc4a441b6d90ed27e8fd99
-
Filesize
9KB
MD5940e44fd1b6df1fc494b4d45934c3d1b
SHA10ab8c5e51049df034c96e3c23a51c4c536c35c09
SHA2563a5fababd56c97f52ef2fa83df525d49199be50b80b1590e4a885b3b7ec4fd78
SHA512a6d207150905aea6a332b0a664917c74383fb2758cdde548c49594ecc5e195e3ddf7883e88033c6fa90fa88992b0c8da947717cdbc4df56856a12cf3f884455b
-
Filesize
9KB
MD51be723cb4b601d5d14340ab1bb6e9b59
SHA1c8253b509f0d6896698058dcfaa334cde487c3bb
SHA2569a30819d3dba1305521a64238444953ee615c1a86fef28952ab1e5110258c45b
SHA512116ef31ac59391e01d31e16c6275c4fb6a9c5b9bd576aa64ac0fc2095ab2004b624336a6591315a12216d7edb2e73ac1b04a15f4915cc131747b9c018a649658
-
Filesize
9KB
MD5351e4f69572980ef41c876b1ce26b600
SHA12f7fbdedd79b4a0f31429eef29e93101849099c8
SHA256384d2506911750d4bd37322abf3e223daeee2e54011df5317434d0252a7397b1
SHA51297f317d72fa03b1d64e8e91ec94d2dedc09d11a664ed4e7a20b91c445480b6c07c1bf565f94f8998a061b8ccdfcce29c9b1708fbf633a17ae4ab490a206e471e
-
Filesize
9KB
MD5330280be526fb37b09201248629c8963
SHA1e5595c1acd401e46660710640e7c689763cdfc69
SHA2567e0dd147c5fc58184bb41d701d23145ff6d67ae29a873b9410ec8881e523ee45
SHA512f738b15be94b48d9d7417242bcf81335d4766c21f00fa626685e32c36e0f012a5c5ba2f1622b9d82f16c3bf993907e4bc314e54b277794ed1940ee1914723b59
-
Filesize
9KB
MD512d5ac433ad2a9e0b42131f0e478b037
SHA1631e541025d76646a29c835363f44ff93cfc7784
SHA25638703e75e6de2c2df272231f0285cba03261f54701e08b88edc5d0ee94ae4341
SHA5122e8349acbec2557a8353655d9c400f5f9a558d3ee482c73bb563f99bfae5e4af9fb4df49ed5a02509502b94fc5d17f9f4cd7cab7d668f1c7e4a8f1e314763be2
-
Filesize
9KB
MD594dbc03ba4f41e0727a61c1b9058fe13
SHA19e57a91a721b4d82cca222a72a0fb83b28675a64
SHA256bdbcca90683a15ca6d414baca3d1db7fad777c273fdb9477238ca6086b511367
SHA512e06a71a75cad41d2413e6ad4c3835480c8b9df1fec432f2098be1a32d709cffaffac90fbd452e9a4b2e8d4c350070d257a3fdd530b7cde5786d15495ac8ad428
-
Filesize
9KB
MD5846f1a0d349a34125cc1bfb66cb4568f
SHA150fc6055d66b3b11144f7132e6a447c5c75adf00
SHA25656671d832efaf13ed5c94fba06a56ffd342611da77a43ece7ab3a261e14e2fc3
SHA51244353ab486bfa45fe102849a6e9696786cdeaaa67d96b471119dd81ae3dc7877237db69e92759919e87b3d9c71efa446116899765849ca2d2848c47581fbd8aa
-
Filesize
9KB
MD537757da3eef8b9c39e4258a900eba639
SHA1f430f55f9bcd045ae7d7ab87bb3bfb6908205e61
SHA2564f1dfabd4e76fcf314ac901ad06a483ec2fe2a72698021dac4f372c152dbdc05
SHA512e31fe38147fd8f9721a3c8de3f6a66ba0d42c81c22e8858790040c625e6be53be43b829957f921f0072005430939d934879583d83e51308c5a201cf40e36f41e
-
Filesize
9KB
MD50c13890bcc357072f9e4c5ad6a928e34
SHA109bd1616ad87c0fa4cc12e1645b73517151925e6
SHA256e39b0f85b78e9fbc7c7215a8ca9b29b25f8b773dd6b25c3bd620dd8a51cabacd
SHA5121e50c8cdb5432523070a28b25573aaa5d69633e9a49bfe67c62d7a2884c3937859a34d7ad547624d3df8d49f272c0fa1d4555bd48e2d06721ca86043cb857f30
-
Filesize
9KB
MD5549ddaa31e83cf572222d2157000d8f6
SHA1e486c2437f30beddc48d4d20049ce5d6e9444a4e
SHA25606cdae79d71a7e6aa11f8364c4c52bef06ca47e4bce70c6b56612232dfb4be8a
SHA5120f8d991c0c5ec53d6f1d74bd5e9869045270adb450b4d5808fac9c51a2564c70d9db2338d4274dea07c3cdddd07dc9c2c3ef17be47f0b586f10270f16d0f51cb
-
Filesize
9KB
MD5b41e3bd92dc80eeb853a496515cae67f
SHA12d80898607d892bb8e22d0d7f06ed0f338784c28
SHA256808b70be5fe7a5200402e5a84c28d1bceba88471cb61a62adc166159e6189435
SHA5121a9fa31e179e271bf3a13892f2bd072062c3bb186126b04859ea593a117bf959b601b1c5d4a057830e44c1f3ec9336076634a51028ca31b3b50c046890267673
-
Filesize
9KB
MD5e0c7de3b9eafb95f496bae16c9156162
SHA18fe609672700d5840532e43f129453c2142cd1f1
SHA2566b2c99703be5518859859dfb0097f49e2b5ecad557046aaa5ee66bbe02d816ef
SHA512e0ba1f9e47fc1396557f8e8fa21aa04ddfd752e895e218250d7d706cc92dfcd39da069e9779ad9202a1be230b1f4218be17180c52c0a23f5221d8f9982502dd1
-
Filesize
9KB
MD5112cc4e96b8b784f66e0d64114e3013e
SHA144a29aa47ba21eeb10cb28fbaa0572e0f325eb51
SHA256e3baeab47c427c570f7c274330f757ab56db81fe7e30fea848e00482be83e886
SHA512402129a8c529cc9205731182f385e65d3b696bf15026e7f96c21016b9adf97d577deaf0cf3940e696668fa1d89ae8ceef980df40d02ab7673d4b38b9ed0ebcbd
-
Filesize
9KB
MD549f0212c0e81dbc238b1bec1909210f3
SHA154046bda590359bffdd1f9501a60276285db1389
SHA256ab7d868695b1325c52d76a2bad67b55c2053c064ade3d2d70102eacc9fbfa406
SHA51230cd55fb336cc77aabd5d408928333da2572f7eae7c6b89d47ab6de1893447e9b7141c9c734682ca694c4e10f4b2e850694a57d72353e79df6ddb0067eacf454
-
Filesize
9KB
MD563b4d248424fcab029003635887cb65d
SHA1fc45ad9c8bd0e55ff26f8af90f5602c55bf3f99a
SHA2561d498c140b540e5166d7b7ee557d4266e69cb0b85b68f138ec7bed8ce97664dc
SHA51294b4404caec1f213587af09d090738ececb7449e16cb60e632ffc44d4ce0085b7a316fdbb376a9f1aef303ddae36531e660d30172871be05c7f65c9dc5af686d
-
Filesize
13KB
MD5086f6d3f75f6e7c7d194e9e5674b6686
SHA11b9d0ec74e82703bcc19742b5eea7ee39331dc86
SHA2564c8ed782e1a33f46598ef5a3fabe56d810ae51c6d6951ce543e7cb58bf942e24
SHA5128e63dd679c07b7ad8f1440b010f3626021cf85ac1d6d5b9d50ef3b3832d018a7026ed01af6bae3ae3d1484296b520ba014aa9bd84c7a7f975dc021da2800f737
-
Filesize
193KB
MD5b4410892141e6426ce69391ad11c0943
SHA1a3d6ef6e11bfa9e829bae6d905baaf0bb0d1b1cc
SHA256ba8d61600a34f49a7f1100e352b32691bc348e419008464c61d772ba8854a87a
SHA51228c79f068332f6a2308c00e128d6f64c586c88f9c4e2b248b95b6c6d79e632e84dc620ba3630c79e4b1f5764ef6d73712ec680d9c49b091deacf6f46400ebcad
-
Filesize
193KB
MD58862ebffe9bbd5d2f85053b34c53c45a
SHA14c7df0cc22cff33817c6958a85403cbad2667e39
SHA25679c825c4e396e80eff186f753bb157506231c6052f3455a0a94d71b254346bea
SHA512d8bed8781b65ba599c7f238b7739b3ddee6e441c88adba3ea03efa1a516af9daa970b77b0f659b3404c8270d014e77879ebc05905be5e0bab9c9460966c0855c