Overview
overview
5Static
static
1IM NEVER LEAVING!.zip
windows11-21h2-x64
1IM NEVER L..._store
windows11-21h2-x64
3IM NEVER L...OS.txt
windows11-21h2-x64
3IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...1.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5IM NEVER L...0.webp
windows11-21h2-x64
5__MACOSX/I..._store
windows11-21h2-x64
3__MACOSX/I...OS.txt
windows11-21h2-x64
3__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...1.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5__MACOSX/I...0.webp
windows11-21h2-x64
5Analysis
-
max time kernel
599s -
max time network
562s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
IM NEVER LEAVING!.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
IM NEVER LEAVING!/.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
IM NEVER LEAVING!/ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
IM NEVER LEAVING!/tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco7_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
IM NEVER LEAVING!/tumblr_ndbolzrktU1qhccbco9_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco10_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco3_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco5_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco6_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco7_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco8_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
IM NEVER LEAVING!/tumblr_ndbos8REDU1qhccbco9_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
IM NEVER LEAVING!/tumblr_ndbp92G3n31qhccbco4_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
__MACOSX/IM NEVER LEAVING!/._.ds_store
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
__MACOSX/IM NEVER LEAVING!/._ILL ALWAYS BE WITH YOU SOOS.txt
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_8c696247ca8d924d040398c4be61115d_e369e403_400.webp
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco10_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco2_250.webp
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco3_250.webp
Resource
win11-20240802-en
General
-
Target
__MACOSX/IM NEVER LEAVING!/._tumblr_ndbolzrktU1qhccbco1_250-1.webp
-
Size
232B
-
MD5
196c6b1e763b7150e6e5fad083833185
-
SHA1
6736e58af9facc9b42d6f13f869b731426acf0ea
-
SHA256
3f358235b18f09b21312eb555601bb868e3536bbe2a4a35f4fff22163ab80beb
-
SHA512
1334278728ca24b5a118c7fb21de78124c6b7e870f7272643d510e1a8bfda4d54ad48dc97b85f86fed1aa4f4c18d6674278393462d43f81ee0de4844673ef48a
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133679436005082955" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe 1472 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe Token: SeShutdownPrivilege 3992 chrome.exe Token: SeCreatePagefilePrivilege 3992 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe 3992 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4828 wrote to memory of 3992 4828 cmd.exe 84 PID 4828 wrote to memory of 3992 4828 cmd.exe 84 PID 3992 wrote to memory of 4580 3992 chrome.exe 87 PID 3992 wrote to memory of 4580 3992 chrome.exe 87 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 2356 3992 chrome.exe 88 PID 3992 wrote to memory of 936 3992 chrome.exe 89 PID 3992 wrote to memory of 936 3992 chrome.exe 89 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90 PID 3992 wrote to memory of 4836 3992 chrome.exe 90
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco1_250-1.webp"1⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\__MACOSX\IM NEVER LEAVING!\._tumblr_ndbolzrktU1qhccbco1_250-1.webp2⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce405cc40,0x7ffce405cc4c,0x7ffce405cc583⤵PID:4580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1932,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1928 /prefetch:23⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2012,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2068 /prefetch:33⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2400 /prefetch:83⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3132 /prefetch:13⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:13⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4412,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:83⤵PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4608,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:83⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4916,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4664 /prefetch:83⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4940,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4956 /prefetch:83⤵PID:4548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4508,i,9433270980905631493,10366264691658146107,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4784 /prefetch:83⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD5bd553c3cee299a86893177c23781d25b
SHA193381b8b26263bd6281b9c96fef275568bbd28da
SHA2566273013e72b4b0b1bd9c98452e7609f02fd707ae3e03e5fd37b63ae6cf91e358
SHA51296ff10d369a17d1b442693f8fe5dabda0862045b5cf112c4f59d84bf2523bdce59f0331f63034948ddbb2e86b5ec5e912050fc2c6d6a2f5e89d7bc8ffdc3b557
-
Filesize
1KB
MD5955cbe93fa2ff30269f24c50626262d4
SHA1638d30d181af48460e5a3a84d06df27b025798c7
SHA25680b86e3ab3ed4d5498c88a9d2bbc235316f526c99cb9673d5bb0d0b197ea4c68
SHA51251876b22c55f325258e08762d21137698edc4924246026871ca3da675ddab009d231457f5838140b986938d8dd28ff244e57633a2750a06ad98e0cb8ddf400fc
-
Filesize
1KB
MD55f835e016e3fd01762b78ddce8e8a4ee
SHA139bb5ea73c333551e15f3a851a851dfc35a1ed51
SHA256dac63e592ed1d4909ea7d7d03317ed7807608f1961186944c63a1f4228550bd2
SHA512bee02cb3bf94b9a3124c60bf71f8cc6075359a42c9164a34bf0d5fde1a7a1b4f32cb0b45091197993d855da04f0dd6896910130a7d8738f1f5788f999732332e
-
Filesize
1KB
MD5f4478849a79d1194b34fcbe43637bcaf
SHA1d9a816ba929a3ae7893d4fcdba8794d883a17ba4
SHA256f090f57ca5cf90a0d5524541e1ab30ca9248c3d2d5bd2fbabfc350ad27a6eae3
SHA5128069ffa65d13d5d9a45fbc47134778c09eea3c23e873ea3fd671b1e53f45695ed172ca63e51c30a46f4bc26414f9f42be0e4e310cb03e8562868ed2591a169b6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5b427bfb8ef4cdf118e6e586ab5d643b9
SHA13090eb4977f8ebe9eb4b3a5dae6d94cc5fafd196
SHA256cc3e3e3701f2a8c504a9b39a2965ef3f21d5bd2dfcfa6239a32ddb827546b4f5
SHA512ca01ca40e7f076de6b038f5ba0ce66ea3bda99f6462dfac4f7dc9781fa49c97f20ec528f9cac0a483e2de1d91cb1c5e5c8f2cd8c0eb730799b8c79e3b80c3e0e
-
Filesize
9KB
MD56c4aee1e465a30acefb47f4b81c29992
SHA15b898a740c5c5ef64546107fc49281c23194da16
SHA256d51c865bf4f5b017636a0a2d31866cd60bf00449860a76edb749bf5f0c8f2d77
SHA5127c30d53a434394ac655598947fd2f4394c8e3b27a35b952f22a7a63258ed77875730827dbde9f0006f79af29454650951e324d76587e3db6b01f8cb9788ae3a6
-
Filesize
9KB
MD5f19ca0ca144ff759c7b651a634de6ac6
SHA15137044a50ea44198af16c3756ac8f5bd4284cea
SHA25663e718b57c5c796c71c081c5be6c1227f04080fe5826e497df80c0fb38511510
SHA512dac9b322ebb51fe1633f31a0378ae2c7a75126abf0e0e229efc10f76f4dee3d17f8a48ab3a4411ad3869f07dc3a82adb0de9d9bd3ffa07e7fe7b2f19c8a7f322
-
Filesize
8KB
MD507a16818263d25dee2f7536a79e92ed4
SHA10f52838e8135535809b7a24ce256bb0a9d1b9068
SHA2563e10558d548bc2d8353060a77a57d614194174f0bbcb7f537064dc83b27a989a
SHA5127ec1c3c81495a895fa1365071270e198deda0b30a21bb154c41b78f54bb1dacd7dbf6ad1ea2be368a1876b97bfc08788f5dbd18ea345e70c22ba78b12b534eb7
-
Filesize
9KB
MD5379336bb830e07d42f13cea2d062611b
SHA17225563c770a0e779682a28ed6087e2ba769abef
SHA2561d50e021811f00f4dbb62fe928453381ab8161313f25f87158bb5cf493487b15
SHA5123c18ef0c669f666a1c169b316a4d667e560630c3efa20f04b3a05aeb848b85afa619e5d16a291528e65ae368b163723a2267a578dd40bbf5a3b4c89861a28e49
-
Filesize
9KB
MD5d0e51e79831bf146a34bb45854f710ef
SHA1e56595afb7e306d71c92aa27623aebe5e99859c7
SHA2561e31f5cedd79cb82fbe4bf67b79002fa7cd9f1234c81031777d20e6359fd348f
SHA5123bfff26c50dda1000d1eccfbab56f58e757f712a44b31ed4c209bf025b0e8a2ec0b459dc9f53ea06f762606b6a3ba9ef7b4efd0d691dfdb918bb19cb9afbcbfd
-
Filesize
9KB
MD54e44ef5c122048eed7aacd48da74673e
SHA1092259003e5061e4913c25c900dfac2f2f8c6b34
SHA2563c9ace353f294a93cc47efae9b77f632ae886a43592be04910ebaefa1457b244
SHA51269e0f82671b12953104682861022d3c83f2e5d989ae19c2bf5cb7f8b51cd45f42b331fd261d439e1a20444999cacba0dc5dcb2518af45a0b72e93ee9bf1c723f
-
Filesize
9KB
MD53d11bb1eaf67ad91d8f1f2ea9a532076
SHA18a92aa38b296d714a97ec8a9cd28503e6a470349
SHA2560352a1f702d6f62f3c384219d96c731d20deb44672361ef2c07d7a128bd6ea25
SHA512d8d11a42b69cbc25f5e626eb7911e6dfc77718ebeaad406002a177f152b87921a9f8dc8d0bcb8b2c7c64597652ede8db199e037a35c5ba7def017bee912cf10f
-
Filesize
9KB
MD59469cde74a4a6732647a86b6fb9b7150
SHA1fa5739c7f7218473b70e48f1de0acb3c7a32ff6e
SHA2565a6408f1b67023140e2ac8f5f21f618ea5a7f3e7aa36ca28171fb4e538a43926
SHA512015028d00d0747d48c4bb83f7acccb11b420b75dfd74ff580a834476496c537b0a1918b692ecfcf360e3cf4a3faebfa24e76f45e1b4cb525519c2accbe919b26
-
Filesize
9KB
MD53fa07afc75a18586fced456bc732600f
SHA1fd88eec353d2ee3fc39016c4e0aa86d57cf68ac8
SHA256980084e27c980e716d5f79e17c56fb8b210298f9264e703dc9f16423004cd2e6
SHA51212837dce7060aa4519872e341f849b3a51a5405e547b6af3d253b1c469c4ad5bba94979e817a922f0027b4d2f97b7c673fd6e70f71a5749a38172b3b5257323f
-
Filesize
9KB
MD5d2009ec33523fea2499c7411cb9f42e3
SHA1dd41b8ed74693f6abeba71aacbbe93d081ab164a
SHA2566de8bdcbbc5207fbb4eb41fc79a325b72aea33bebdb15f28a49c6a005ee108a5
SHA51219b06555163ca114635480d2ceeba5af6b5203933f3fdcfa2a265c7b062b6be7666dddc40d4595f43dda8d74a5447fe1c4ef8e4fc110eb23c373257fb0abea6c
-
Filesize
9KB
MD5f2a07e089eeca5c89c1bd4ee0e9520cb
SHA16c7127529c95dc78241b84f9b83415a8d1fb6154
SHA25644b5657040593d3d28bf939e97284625f3b603f5345ba9579a0dc76f49468ae5
SHA512873777fcca2a53dcddca1eb91de064d6163aaa7721ca41bfc4dad64aa7d36d6e5644c529425cf49cf86351583ad6d97df11118fbca874ae9f69fa06df2fecbdc
-
Filesize
9KB
MD5ea930c4b03814e2c145f82e04a23c0a7
SHA14bdb0b98ded4d889430321b3bb24633eff8dce47
SHA2563b51509313febdf559d9c65c7ce639f9cda9ee2e7b4a49cd1972fd6e8b7179be
SHA512a610d2920d94a5acb2f6b9e84e297049c3aa065f149df03a9dfce0fa7921b21793c0f53f6cb9a9942a91f9f6f8bf08dcf2a06e5987125f6a03c4f8841311b528
-
Filesize
9KB
MD5f82c7102f925373d0b2ea6e4bb559862
SHA1a44e6a9f6f573d2c7a9d6b86cc0957e48cc4a887
SHA2562bd8f319b041ee695c1b289dd7ddd06bacccb0eac54e2da86164409b786e6b9e
SHA51274d163a66d4ce97e2be9304c81cd66836da5a13709657ed4c9f9913ededf476b2b3e3e1c6546003a3cc15a4b8ca5c163490a31726426533cef64be62aaf104c4
-
Filesize
9KB
MD58693b3021bf29fa310b15d3f2e2d697c
SHA1a9a7e55d8255bc3659d4f52100015545d5f83918
SHA256f51f5d87a1e3e36576f2101c0a9e958b05ac36e23abf788a170babb3cce742f8
SHA512b83865bba418ed5d378f433c2fdb3537d7f34fc908e9ffc7131f1a61773c68e10146e78a9da41cf44d1c52233bd23ec0d1847f5f3d70e5f5056fa1589e22ac37
-
Filesize
9KB
MD5e0e872b66310c4bd4633649ddb6786f2
SHA15a06f71f31b4936eb5e57f9fffe64b1a341bf80e
SHA2568a5041f035cd4261bb322e88ca31d76620c6959dd2b362e372f539efdc16e216
SHA5123d2a3f615cb860ff45986cbdc24b961437ddfedafdf4a99bc27d2c3b5d871cc5714b036414eb3e44bb4debdd767c94e4ea40952cbc5c9c1ef5dba80fd0a4e708
-
Filesize
9KB
MD5f34938611fd746e9b390601a71559a1c
SHA1e1fd1cc1627c78f4285ddb75d56ef0784d390d49
SHA256f186b1d4790ac4a4f1ab92efcd2c9500e9f34ee64a85865ab72faadf59caa965
SHA5127c905d52c8a97c8f152c5633c08c3a6b26020050cb14f98e92969a2c6e0e914cae36e25ab73938e6c05e976c66cd23bb581229c9dcb41efe20a9b26dd174a485
-
Filesize
9KB
MD510a6032bf8d223a0d5e4352735a9c26a
SHA10ef706ee236300d5404623ef5f521d19897b2233
SHA256eb4309672f64c0afc8e227583c4fff388f14902ab6b8f97f20cf5a461cb69347
SHA512f3770292b5537f8664c46c0e847fbf6685a155afea3facbb949e5cb2515a88c9cb468f72469d532fb3d4b97f38d702d2f53f09e6e023a91ab345de5ed05321cd
-
Filesize
9KB
MD5756ef483820b7f296fabf391187f1395
SHA1a7ae9b07f28eb4bbf3620f67929a13c8eee0e8fc
SHA25621d922600a940cd2fdbb00d741c47d31a95f7c9470e83a120684a3e41f28fbd3
SHA51245d223f6342dff9bb670e1c0d3ef494acd4aff3a831386e5b417f317cf431536e919a9c8766cd171149d4c5102046583557d2db65e8bc668e5b7f081ba29017c
-
Filesize
9KB
MD52bf48e9d1f5159734710e62a9c7c9502
SHA1b9d226186a8a3dce2ea789d6dd3e67541503a9c1
SHA2566fa2b91a428c87f968425817b39fcba6ba6245db2287455913c39aa9c6cac8e5
SHA512ca6e99adce9724ff325ff14989384751163a81781639d3d9b64ccc8c8bcae564ea2b5a606fc3b8891567de584806b0f93d296de793cd5582bff5846abb60e1a6
-
Filesize
9KB
MD5bf4a208da0754750474ca89eae598351
SHA10bf284b1e83d665c9ab21248abfb4e0d77bd57d2
SHA2568d08be3e6eb470c8398cfc46fbeb7e080f6c9e0e7ed6aeba729834015e7c63ae
SHA512d4ed37425786b6f1f79dbdc1433bbb8543c985e9e3682624f46985b83f8b06d00e76c9cba8fd4983c2ee87bc79d2cd3921443cead8dbb370dad20a3d7098ed1c
-
Filesize
9KB
MD584ace28b6686a9eea1b5f85497f36f00
SHA192f6b097e3cfcc778664538ef2f2e8e8c62e437a
SHA256e5051507c62ffa7c9e79065af058d00ccde5b6b57b3946dfa93a0ffba4ac87d6
SHA5128f7ed7ba5fd7a6249ff8fe48a4d3b36e0d1dd4d376a103d374571a6d146261bebbc76d1540e30fbcfd12c5377e1d114adfe1e47ed6638dce82ccc1f7bd64651c
-
Filesize
9KB
MD541ba934480ada3008ed55556b3b14532
SHA18425c0ab71ec2ecc3bf3ecd7a5f3d655fefd044e
SHA256bf031f4939f951fd74d201721121c9f6144379a9a99ab8509d0d1df556c07af4
SHA51285da2c1543088ddf4069d3e285ca38ecfdc9dff466bb2dc0fe75f8316819e1e4b457e67bd670b518a65bb8648ab621f3c15f7fb4ea3b6a12c33c0c2417af875b
-
Filesize
9KB
MD5431b632e2a297e7424d1528cf8bd3ef6
SHA19d4f9ca1ceeeaeed4d58e53c26a1f233521b7211
SHA25693e0b4da2d07fbdf92f399683492a14e5de06112fc13dd3ee1fb87eb3fd55294
SHA512edc071ad34245ccd379c70cd5eeb9160edecdba78e2c07729c2fdbdee9833b498c6679a437f881402b75b1894f126e1365b05032f2f038069e809f3e81e0355a
-
Filesize
9KB
MD5cfde19972106f79b78a20269a989afa7
SHA1c45d27b3ac49e00517a55af8ada4c5bf7eae1f43
SHA2562b6647318f80110200918b8924159cafe999f35c4ddec385285f2991c49683f5
SHA512403d7c4a79a206e7a4f4762e617f62dc6f73a5e4ae4f53fd2913a5951906fed9bb99e92d351da883f0cfc2d98fbed46405ad29f27c1d96364e0e86ac63682615
-
Filesize
15KB
MD5facc503f719c9c1524e110a0d8b27ab7
SHA1edc3d0a3bdcbd7e931f98b32aeb6b3da08df6ed5
SHA256f6e9481f316b2429daf7cfa852bb6e396f3fd655dce9a7679f0546c524fc391b
SHA51211870b6ca6114e8253fbda76499cbff77b0c1e0c8f3483ccfcb81ce0ab480e60010d7fb6962fe20bfd47faa1b8b177148f6ea48404fcec616d1d0cd900e5cec5
-
Filesize
196KB
MD5abc57b54756edfc1641c330f7e81c706
SHA1b36b98e0fcdb5655f10037bd3cc1042cfc60fd6a
SHA2568afb0d7260e741d15c3392f0306e84550b03e8d5b218f4fb8e8e49090d8f1b02
SHA512930c003d83cc2d1f637a54ec960b6a90689b012dbff291ac7d7de52f8ee5a97555eef5c1b937b3a339834557d6134d9f18dd46246d757a14ce5b9489a55c908f
-
Filesize
195KB
MD5b4eeece30a443fd783d055ce41b138cb
SHA14aabc88bbcc0898fd2be0ac6c54186b1e0e8e176
SHA2569cf7de58b5b2e6b399d07ff683dc9f76816261fb4f584ea7d62a4e4d32cee336
SHA512d9680ca472547f70816aafff94258ad5dd008e0a76a9fb320559926898532ce36d7988229626af85197618f9b7df96c4a3c4bc7339a74a7feb205a0d307a1330
-
Filesize
195KB
MD5d08e82adf182a8fbde9dd03deed1b24a
SHA16f3028e3f8ae184e7fa7b0d8718cb8da0c0cf0ae
SHA256661c89c708b79d3ec6814a98cbed8912d78c83d6c641d61cce0c8644c9cc5c8b
SHA512a1fc5df8b9e46c73cabe038e0e869f5891530a3f3644a49bc816b272520300c3321000c50f45cc1ca6179ba64675dcfa1d1ef74133a1d54451f1dbfd67fb3991
-
Filesize
227KB
MD59da28ff9a66e92df06d54445c4b37c29
SHA1bd197824bccc5b85a10d8a5717555581f69a9e29
SHA25648925109f416d15eceab46ed2aaa82748c2f71b5956fb1f81bd2e93056765d23
SHA51269837780a203028f518eef00f785a0104f1f7c3709c196d0076dd33f05851fe81fd566d4c17acd3adda9c95ef1e7844dfff8bba0ed7f6a8470adff3cae6293fa
-
Filesize
195KB
MD5b2805943e9470f48c47a20beb68721a0
SHA11816516cc755b58c771f418f80fdbc7129916b04
SHA256c77a1b4c5c3d1ce2915d4195d24aa3b3eccca4f14f3133bcb11bbb6de44dc4bb
SHA512c01f561c0510ff1b570d89614ba06e139409bc4060d7d1d377220d062b931ecee24aef9f98a6af4b3369c317b882b422d3b3c370612c7591165e9a024cd6d2fe