Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
-
Size
232B
-
MD5
d9dff28e5e67eb33810acf7c022832bd
-
SHA1
f4ba7b3dd8fd704a617c1578cf70f1f8ad031f99
-
SHA256
2891160578aece315219856b51b9c28d0a40fa8f78945f8d42a459f1090e8b36
-
SHA512
8a5b10412477652ffb030b8d2cc1a448a356ba763261facecf41ad015a682b2189285d41a3953d0f7b56ba00b4a3daa861dc26964241a4142dfa98824c9ef42a
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679435972748161" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 2468 chrome.exe 2468 chrome.exe 2468 chrome.exe 2468 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe Token: SeShutdownPrivilege 3892 chrome.exe Token: SeCreatePagefilePrivilege 3892 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1184 wrote to memory of 3892 1184 cmd.exe 82 PID 1184 wrote to memory of 3892 1184 cmd.exe 82 PID 3892 wrote to memory of 3872 3892 chrome.exe 85 PID 3892 wrote to memory of 3872 3892 chrome.exe 85 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 1244 3892 chrome.exe 87 PID 3892 wrote to memory of 3408 3892 chrome.exe 88 PID 3892 wrote to memory of 3408 3892 chrome.exe 88 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89 PID 3892 wrote to memory of 1748 3892 chrome.exe 89
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffaf1fecc40,0x7ffaf1fecc4c,0x7ffaf1fecc583⤵PID:3872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1764,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=584 /prefetch:23⤵PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2076,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2096 /prefetch:33⤵PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2176,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2388 /prefetch:83⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3160 /prefetch:13⤵PID:2144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4580,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4588 /prefetch:83⤵PID:796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4588,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4740 /prefetch:83⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4700,i,9874717588845421789,10176822206026043600,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=216 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\89eb97fc-d761-4afc-9c71-e213311b16e2.tmp
Filesize9KB
MD50a5749cc8bb3f4eba22f40e239ae9439
SHA11e396b2ae7d550493530f88bada5038c8b670dce
SHA25692ae7bfa50329ae476abd5d593386809a8ea68884481508fbccdfe77ae039899
SHA512f6a9ea9036c7ba03fa8153faf1e91b6de2785020f9da29bd36560bb457c38cda99fac91d10ce56f5d9255622ed67e1c82be6c1117b347caf4d8afe0242433773
-
Filesize
649B
MD56504308d07bb982bfc3d52ee3608e6a6
SHA10807bf37bb98848948c871761031bdf825582929
SHA2569a48394ee7fe09165679d91e00f1cb29823beace9157db33a9bca3dd87e48731
SHA512c8680d41b0016923d1a40ba38f343b3c984f7d92fac97c60a58b9b4bb81492247657934ca7a784d76449fb703ff52c180331ccd2d948d559c56c8e8815deff58
-
Filesize
1KB
MD59fdaeca9706a355a9547f8df05cc6f65
SHA1260f5c9bea87f79d2e0d703301ef97ec00caf202
SHA2567e705c67cda240e1e83f07caefb62f1d9faac2d46d5690eee8e0f3a26b4f3662
SHA5124b4dca7f9e009b0a51d2bada160e85968bb878d9d92148600303f3216c982a15ed8292bff2b8373e1eed1d118be344b26fbdfd4144919f8a04a07599d1951bf4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5847165f055f3b8eec66d914550e3a208
SHA17240d364404dc6239f6bc957b1bb3d2a0887667b
SHA256d7d3ad1c6d8075c15eed75c6bb49976aa006dc3bf314411945754daad581d189
SHA51289ed4f9e6d344343c37b4d5f29cac54ec0d0e8e8c263ba3075244ef31e56c1e4e48f888924165e2862015fb069efecba7bc4b56237d253b41a951efcd222925f
-
Filesize
9KB
MD53e15e3a610e9f9ee4a443d10d3e662b1
SHA1e700147b05feabebe28a40a9b1f1602a5d5dd4b7
SHA2562893a497c5c53e889ceae968e5b1c6530acdd001364ecbc2e21afdbdb7f5385b
SHA5122a826b85fa7c4bfc8fdd97b93d56a372bf8df27b352d5f01a7a92e3cf6a8c3d6d4ac799038637c9006b75fa3738501768c9d80c186de8d67e31e102fe7dc1fb5
-
Filesize
8KB
MD5e6fa28f7101ecda17cb7651f56a890dc
SHA15f3a2cdbf1cd715a001f88f41ca62721222e11b7
SHA25692dce09934df6a1f6db89299ebf217ba4bf3758f1e6ba1e129971320764acd33
SHA51223e71d7ba1da0d0f689ddb36257808c450375b69ddb0053052ddfc0d8802a831a10a553071e0cc92771fa1d523264836f902b2b02a9748dc1471eb3ed0b42f28
-
Filesize
8KB
MD5555924782bb0093a37ec97aa84af511e
SHA13d812f399690830fb8bcd9d2f84fc4ae5b7d91c0
SHA25699d18414c7976aa5823f76de52854eab1a33b477e4b2418fc81c520d0609ef76
SHA5129e4ff41e9c589885f30857524ede911521c825221f3f116e88f0075aebf26504787ff61a6f1f5d00a3aa4818465cbc6e0dbb0c2da5199d86b15f6dbced59b80f
-
Filesize
9KB
MD5a684c9ee043c6008b3e8cec4bec37f24
SHA10feef24fdf0d82c61de54cf9675214a1c8ac5351
SHA2568fdbe353f2ca6037a8ecbeec33028999ace98877afa8d8d66bcd00b9137adbe4
SHA5129714b7fb1aca0c18cf325ce56cf363a4e70d1875d42b4a18b6db2e4943340d9e70758e7f17e4bf9c1d24e221a181624cec9c0dc4525928fe0bc5351704a240cb
-
Filesize
9KB
MD5e7853d599f40488bb6806ec3908ef2b7
SHA1fa36ce8f45ed32663c357a30576972c4b3632a98
SHA256f35f5165aff0e1dacf473ac58a356e6f44374e562afd26d4e6ae629a2d422abb
SHA512d2bead0ec184c47218c0cc58e1e1bc15ed2793885e9b8cabd831de0ecb2dcaa8a3d347a9adb1d5fa671371503796ca035945da24eae1ceb9b56e11c9512b502b
-
Filesize
9KB
MD5f784317d82fd6b402c9ac0dc63be8014
SHA10ec0d44f3cf47f26469d804b690751ff06dbca6d
SHA256d152e3d2af473a346b7878dc42fb8e051fa1cb556a806d7e6c3f4ee33953e9a6
SHA5127652ebbb9a9cb030b870fdcc68ec27ac61f95d761bde39fa6eb050015b8be804488269f194f6d09af18290eacaf695bba10f635a96cae54adb2fce8c5e130869
-
Filesize
9KB
MD58630ac450369d274b78b85be86a6b09d
SHA174d46b31e1889f680dd1f79b87021f8d00541565
SHA256f8da4aea2dfa19ee20641ac7f3532e08271718ad0533dc3a1354729e9e40a188
SHA512d1df50dd4ce27c360e265f287daf86d1103af460698328fd7a543b88a17952fc21342256cdd13a56642a8af5927636ef811571ca762b8b60fd67b058fd9c2ea8
-
Filesize
9KB
MD593d88cf63092fe09d97ddb6a564e5c75
SHA189db1d75cca488e0a8b77f0a22cd7497a8f26e5a
SHA2560f49129a5f2ffa18011cda8ec2f72a58d6d9acaf20c97ee7b8a67c68a1da7b92
SHA51290c27b588249ace481d8c13e4ba1cf66a6fdaa35be7ace33dad6f1f48fc69b58638a4853c68ebabbb8578ae1f76bd9c7a2c1f7a0d539eb9b884b8752d62d6e53
-
Filesize
9KB
MD5037747d5f1661e4ea89c4f414c81cbcb
SHA1214ea48f8dcaaedaaec2fcd4bbf0dad52a30ad0e
SHA2565e3b91dcd17161701034d4d4138519215e80c2e4ca64e135ca831c489a97e17b
SHA5126525ea43fbf4da05d39846632fcca4521b90de56a339293d658ceb84a7e8eaed4887374e1f1dcd27a7b4e5fccdd14faa9d0447b14c090b331bee7e96e9fb21a6
-
Filesize
9KB
MD557bd3391556e669859ccaa1bc59b2bb6
SHA13a31f2f105e3bfd788171e1388b4eb1e73f7ed46
SHA25601e293d1d8a1dfaca08cbb4c8f3d529e9d7022a35ab12f77b6c1a84fe0282394
SHA512f81d86614f2cf930125861e5d1f929ce6331589bf49120e67ef7a3eaed739e4b36b264fcc3381e425786e8156fb7acfb31d9d27e2aaf4ef20f71e16c016f9c8f
-
Filesize
9KB
MD538e7093884e30311d1c45e20b218aff0
SHA128f58325cef0fa408fb868910bb671ff0d59dc23
SHA25619e59618554f0154f342f164e5358f303221375d19be146fbfe54d1f2337a47b
SHA512fa6833947a6facd559d2888df940ae35ce6f9781ed91a917940849ecb98e5f9492aca1ba74ecf39aef94d0d9141bd9bcf226e25477afa553e7a39d1e812eeb9f
-
Filesize
9KB
MD5a9906af62dbf19282fdcbbe6409606f7
SHA1f4790dbfa29e4328e2d7e87ed92893d4312ceada
SHA25666c23ad8098edea5fdd42d26e3980d07ff37a3bff885c3b8ff1557b81c53b0e0
SHA5120eec4cb5efddc7ea43195a15213fde3ed129832c46faebb635088d9a8849bd992282f47b31ab8efb4f9bb120b79ff52976c4fe6b3e1a959523164fd4a08c71c3
-
Filesize
9KB
MD554ae7616f27e7eec042148dc7c0cdb64
SHA1fa9be291941378981a7a0c1afb0df6e18709b0b8
SHA256d8f9852bfa2990535f32861785f4c61fabf4a4a8ae3c215b47ca5791020bc00a
SHA51236b8218ff278738f4c58c85c850e5433c59ef1583fbf25a8f8f01efb78bafc92fad5fb1644b1b0a687535cdca4007dafb5926bee38f0403766659bf88d558f3e
-
Filesize
9KB
MD59129666f7fd258a8ab2eb67ffbb4e39c
SHA1e3af59cf9602932c522065a58f656e2bcf79a262
SHA256910d4f4ae349a87e95e19076ebc53678748daef35db5879d5740a12ea78aa37d
SHA512279103c8e0560c6257afa3a0454849bcaaa6801587ca10b0268246171e1647c334b9a55bef26758ad4602c920c2e803594b49a3bc25683beeab86abe434bac49
-
Filesize
9KB
MD55e02525e9b991a6324ef4cd3282ea722
SHA1558da04fb999e6c2b68e03af511591a850b94626
SHA2564a6a8ad9f1f9046816085d9f9fcae9e995a97a24f403df6db12f52b1a771a88e
SHA51225e745999f71a7c51987bd331fd411e5b6a621a043250394c1ae244086812eb5468f17bd791855887bc3984498b12f802efa4417e0a94794d45fcc58448d52e1
-
Filesize
9KB
MD5cd0ad31e30db94baa315fb4add2b8a5f
SHA1bd51ee42aba9642a2eb67f9da49330c1b8bfcae4
SHA256d3af77506958b977ef2276c11f3f5e57a635be1842daa5495c652181c8612e51
SHA51265189e4109780f722aba29b304e0f7159ca556e8a95cbde2a83f5364be1bc9fc61e40aa8ba3ff5d3ce4bac0f84b8c283724cdf991d35f39ddd6a9dc4bd44ab15
-
Filesize
9KB
MD5785850d6955885c4ee121166eed420cf
SHA12a2268aed387e3c17c0a785233dffb32f5e1157a
SHA256bc978abf75ad44698b6c0c0729c2272d762bfc1c0e8c8d27b269837749aaa18b
SHA512e390332c7726a117190ab88eba31de5729c0e5b48ef1ce59947526fe04e0fc1570d1b280b7af60404cc576821ceb2a087913f230715ae753e92fa4c90a1fe42d
-
Filesize
9KB
MD564a3b90bd1e5309e72b25361033c0af3
SHA1308e73f8bade9f754ea89e65350447c823e8caf3
SHA256904c54d031201e6a78de4a9a88927c1a63f02ef50eb7a1fd9b56db997374579a
SHA5129df4d1241f4ed7b2b771e7ef13fe191676d65a5db252cdc99759a3bcb977dfba5eefd2c9dbe21ee3c9207b892ba18583a87dd59f3c76f85887a8cc1b6404f6f9
-
Filesize
9KB
MD5a14f56085cc7b2265a372bd86ea15f03
SHA1398f5e7a46102c39880254f4a3db4c15d3f2cfa0
SHA2568561ad5cf1d1007026e1a7cf82befe59119d45a0a748d54052ac8d709fa32468
SHA512fe1a5a216cd2f039f33e1be0dc75b5eae528e2cb2f1a3de95afb5b828d9e4942717c78814c7a3d148d19b07dbcdf7674100220abded3ce2cec224f399e8a0a65
-
Filesize
9KB
MD58d769442131f9e9096396afc2899299b
SHA19c433137bfccd2e3fc33e3093c068c157c4e170f
SHA256eddcb74ad811482320d7cdfef1e1d474c38dca539732baae5ffec4421ebc0c08
SHA512e07afa00672f5edc4660820a0b4bae0128fdbaafffb13073b7ce06d21952b23a8fe8f391c2e80ce2c86b61890a9a9c2dc9bbc166a3d87565b4e80df0cc4a3467
-
Filesize
9KB
MD558da39ce3003d64304c1794601bc6929
SHA17bd5fc379a35a47999ad37eac7f28dc061e79d28
SHA256c3891d9f3d2da15ecdc6db63d0fe5f865d980dfd767cddb784c24d5a5a449b69
SHA51220e2ddbaf3f1be7939c470ed8a65ec09451a470faac23d4f4a55cc1499b5a78221fff1a6e445453817a41658df245fae8233007c5919ab1bba558d86f3cfd178
-
Filesize
9KB
MD5cf508a1df468b44c00e7006748115f7d
SHA1974a7ed427c7f193781b57474d23ca52f45553fa
SHA256f7fc0ed274c17928360bd03552e0ce20c0c6c9126e3910b6a855a6c8ac4c4925
SHA512e9b3464a43fb01b9137a688849ecb159a22d75d546bdc047040f775151861109dc928067847d95c213985e96d9bca2ab10ffacea81e1eda0bc0b775affa068e6
-
Filesize
9KB
MD5421e8d8faada2611095e1cdb7aed86b4
SHA13ff2810952ca14ca89ed087a2cad1b8c11b5b263
SHA2560ca114f5eafe853e14fd84f60e2de24b961457b17d92bd5578368e47b0dd74a3
SHA5124c8516aebb8423228f0879e306a928ee63a8d2787a9840ae77c9f664b0e71f2e1283d443a7df0713554bf0ed6cc5068a2b8382cb96ab7c5c929862a58c1c63d8
-
Filesize
9KB
MD5b07d88f648c9bdfc7899356b551d91aa
SHA174ca785afd4f1567a44711cf480896b29cd03d8e
SHA2564af23660997c284394aa14fc733caa70a3e0476e978917d55a433b4a4df56cbb
SHA512bfd2e227e121e8b5346e939f6b2c8287fe8838b2e1e57dbd04131f2d0b71d420656a955ee08229fe13db7766b8d2b31f02f57a160d14cdb5c5939f5be848ba4b
-
Filesize
9KB
MD523eeb6eef33b300c10c7b347c32c2d25
SHA1b2245ae276f8d85d8dc78c3bcf5605e897c71297
SHA256038d475be112e3f1cb6d620f05ad3d9abeddd9c1f014586bde0ad7844795b204
SHA512f5298943b6e19dbb5363dd1ed9c49d8ce24b8285e6ab92ae968ceb4047aedeada5c7fe733f251bc3b8a8e79b6886bf921e22eb2620ff7f0e69e951c79c8691e0
-
Filesize
9KB
MD50a6e40352f760975d8d4e5e9eb24d588
SHA199c37370f84045601e796b577df78df0f55c862f
SHA256e93580637d4ad9f6dac6d885ed5c8530f9f263dda16b6671484905e775a838c6
SHA512a0cf8a6698b173f20a87131b885b8568e86999f53d60dfcac373dd94a5537ff8bc7cbcceb2b7371d7d7c533a7326b88aec72d0bb0d2e4364c676d3ecff237570
-
Filesize
9KB
MD5046599c0f61830be38f6be0a7f09a0e0
SHA167ec64ea28d5e88fbb0b5071091b5d06c177221c
SHA25608f7ef63beec52d30b253a9be7d65bb27581a302132f69af444c1ce5093db88e
SHA51206689086ca37587e72e8c75b28f8489fbd2d0a7bd1fa4dbad1c35553308ab606ff34a32e53ddaa1efb4aac1d61c570d10247cdce1bba75ea1f492f11c3514375
-
Filesize
15KB
MD52838df2afd1656a2708c72435de37c3f
SHA1319671a5f5aa3ec0526a2fc1d6d64117e4d6994e
SHA2566242ed721e5217ae796ad04dc869e955e8bfe3df3e51e42331baff729593d946
SHA5126923789581243de32db471e48e7c8f5a7197d57244ec142a514fd095ab3df83e6a6620595cc4ef42be50fcbcc5550cb2a5b3e820103560603fd120850c2df144
-
Filesize
193KB
MD5b855d1036d7826ae55992f923da29d09
SHA14a0cdf41b434e722b1469c7149dfd06ea58486a7
SHA2560a4261af5bb90af23da4fd2bacbf7b02beea119aff85ce6dc8be584009e57994
SHA51263d40145d9d04ef33e13ce8ea2aa5b49266eb9558af46a27d007151a9aa5ebcb18ae75ba3ba681f26777cee63f89441e4eccb2c4237ea1dffe366c9a3a741dff
-
Filesize
193KB
MD5e40c643c4c427c9cd22effb11635f4ee
SHA1821825342d6f5a81852be23b7457285bedcf053c
SHA256a0ffbf311b0a4b7e59eb2deda3fc9e3e029cdcde696ab867a94d35957bcdc6c8
SHA5122b4a9aac6cafff6dcd1977e276dc2659d78f6635cc7941b330c9ed5b69d97aee046a8d76704f59d4a4d39525e49ec64c068eecd5246a51fd0cdb73b8f8d71dc7