Analysis
-
max time kernel
299s -
max time network
294s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-10-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
clop.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
clop.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
clop.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
clop.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
clop.exe
Resource
win11-20240802-en
General
-
Target
clop.exe
-
Size
100KB
-
MD5
8752a7a052ba75239b86b0da1d483dd7
-
SHA1
6eeef883d209d02a05ae9e6a2f37c6cbf69f4d89
-
SHA256
3320f11728458d01eef62e10e48897ec1c2277c1fe1aa2d471a16b4dccfc1207
-
SHA512
57d19e9254ecaeaf301e11598c88b1440f3f85baf0cb8d7a0ac952cd6d63f565df9809b13f50a059302bfb0f81a5c498e49837e2e9480ec9b51c14a409fbdb65
-
SSDEEP
1536:gHIPkRUedYttp2bd/B8quuaOY2IfpW+VQJFsW69cdCeRk28+axHPjsb5:EYtLqJSquu42CW+VwisCgk2DaxHPj+5
Malware Config
Extracted
C:\$Recycle.Bin\ClopReadMe.txt
clop
Signatures
-
clop
Ransomware discovered in early 2019 which has been actively developed since release.
-
Renames multiple (280) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 24 IoCs
Processes:
clop.exedescription ioc process File opened for modification C:\Users\Admin\OneDrive\desktop.ini clop.exe File opened for modification C:\Users\Admin\Videos\desktop.ini clop.exe File opened for modification C:\Users\Public\desktop.ini clop.exe File opened for modification C:\Users\Public\Downloads\desktop.ini clop.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-131918955-2378418313-883382443-1000\desktop.ini clop.exe File opened for modification C:\Users\Admin\Documents\desktop.ini clop.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini clop.exe File opened for modification C:\Users\Admin\Links\desktop.ini clop.exe File opened for modification C:\Users\Admin\Music\desktop.ini clop.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini clop.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini clop.exe File opened for modification C:\Users\Public\Videos\desktop.ini clop.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-131918955-2378418313-883382443-1000\desktop.ini clop.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini clop.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini clop.exe File opened for modification C:\Users\Admin\Searches\desktop.ini clop.exe File opened for modification C:\Users\Public\Documents\desktop.ini clop.exe File opened for modification C:\Users\Public\Libraries\desktop.ini clop.exe File opened for modification C:\Users\Public\Music\desktop.ini clop.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini clop.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini clop.exe File opened for modification C:\Users\Public\Pictures\desktop.ini clop.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini clop.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini clop.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
clop.exedescription ioc process File opened (read-only) \??\G: clop.exe File opened (read-only) \??\X: clop.exe File opened (read-only) \??\V: clop.exe File opened (read-only) \??\Y: clop.exe File opened (read-only) \??\I: clop.exe File opened (read-only) \??\J: clop.exe File opened (read-only) \??\K: clop.exe File opened (read-only) \??\M: clop.exe File opened (read-only) \??\O: clop.exe File opened (read-only) \??\T: clop.exe File opened (read-only) \??\B: clop.exe File opened (read-only) \??\E: clop.exe File opened (read-only) \??\L: clop.exe File opened (read-only) \??\N: clop.exe File opened (read-only) \??\P: clop.exe File opened (read-only) \??\Q: clop.exe File opened (read-only) \??\R: clop.exe File opened (read-only) \??\S: clop.exe File opened (read-only) \??\A: clop.exe File opened (read-only) \??\H: clop.exe File opened (read-only) \??\Z: clop.exe File opened (read-only) \??\U: clop.exe File opened (read-only) \??\W: clop.exe -
Drops file in Program Files directory 2 IoCs
Processes:
clop.exedescription ioc process File opened for modification C:\Program Files (x86)\ClopReadMe.txt clop.exe File opened for modification C:\Program Files\ClopReadMe.txt clop.exe -
Drops file in Windows directory 2 IoCs
Processes:
clop.exechrome.exedescription ioc process File opened for modification C:\Windows\ClopReadMe.txt clop.exe File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
clop.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language clop.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133724964778378156" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 2432 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
clop.exepid process 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe 4944 clop.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 2432 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe Token: SeShutdownPrivilege 3968 chrome.exe Token: SeCreatePagefilePrivilege 3968 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
Processes:
vlc.exechrome.exepid process 2432 vlc.exe 2432 vlc.exe 2432 vlc.exe 2432 vlc.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SendNotifyMessage 15 IoCs
Processes:
vlc.exechrome.exepid process 2432 vlc.exe 2432 vlc.exe 2432 vlc.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe 3968 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 2432 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3968 wrote to memory of 4712 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 4712 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 736 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 2540 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 2540 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe PID 3968 wrote to memory of 1748 3968 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\clop.exe"C:\Users\Admin\AppData\Local\Temp\clop.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2432
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd48f5cc40,0x7ffd48f5cc4c,0x7ffd48f5cc582⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1408,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2136 /prefetch:32⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2212,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3552,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:5148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4332,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4324 /prefetch:82⤵PID:5236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4688,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4320 /prefetch:82⤵PID:5244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:5340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4868,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4340 /prefetch:12⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=216,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4664 /prefetch:82⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1144,i,6689516058046064078,1167924135806364736,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3308 /prefetch:82⤵PID:3584
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5da76cdbc83863176e9da51b1c9224139
SHA1fc71801db718efd836c93b6b95dceaa155050290
SHA256e79dfc0bbdefca3815ffb349139a512e7090403a1e4d80414b97b3e567c7c1ad
SHA51258227520b3815a68695e4d80882166d0b6f2fd907b9f6a503acb843769ebc3aa836e5d4af5b9c5896c06543cc3757bd23f6f0c96e69a4cd25163dcc65c915e29
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\259fc6e3-a653-4cbb-a6a8-68d0466808a8.tmp
Filesize9KB
MD5477372318d8389aeec81372a384abd19
SHA1f1ccabe2c793fcfbb5c25703abf885e132a09f4d
SHA256bffb93142bc4b17995bb6939d91ea8ae62744674d27bb733fe17c478279c6edf
SHA512926b8b9b366f5721e455ec4ff8ebe9d78313047206dace66360d95d68356bad46bad716f319e4ba2c6eee525ec9b404fcf88a5d2d9ccf8e59994f5b481ea39ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\6120ef58-d0a4-4db4-ab73-0e1cd7530228.tmp
Filesize9KB
MD5d282f697c4d331285e720cdfb87518ac
SHA122e2b192af5e5f7a39cd6875d5b7f6e80e763aaf
SHA256b8bf91564d3e9737178b6a61b74f924a65216a80a718ccb82c72ec2168d92eb2
SHA51279febd0c56fdbd19957cb84db86bad47b7866f3b51e512bb3837a1fa3197e8f45d29aa991c82635ed429a7d94af4c2fffe9b3952087710ec21eeb6f64d63aedd
-
Filesize
649B
MD5aaebfbbd3925a1b7e356801cf4123539
SHA16ac13a4bef7914eba38259b2c06ab215d455349a
SHA2560024d757e307330252f3696941b44d30fec0a5d13307103725b55a25d1a53a18
SHA5127de212f96159f806d7cada85b8c39de6b5455e3ccc00590f60a106d9c75c6605355af450121c181f1a664c2bdb39088b2383db2d6759ef69c7ee51b06613ae3e
-
Filesize
213KB
MD5f942900ff0a10f251d338c612c456948
SHA14a283d3c8f3dc491e43c430d97c3489ee7a3d320
SHA25638b76a54655aff71271a9ad376ac17f20187abd581bf5aced69ccde0fe6e2fd6
SHA5129b393ce73598ed1997d28ceeddb23491a4d986c337984878ebb0ae06019e30ea77448d375d3d6563c774856d6bc98ee3ca0e0ba88ea5769a451a5e814f6ddb41
-
Filesize
216B
MD5a50dc7720f0d49b96ba921653ac85219
SHA1e3807119ec05de5070e19198e8fea08033fa14b4
SHA256a4e886598793d150cc8718555660d4b0b97e047dafba3c7bea725081f5e67258
SHA512461553958a1b35c3125907115ab801e5b9b722cce7c430dfa90aecbc7568ec37515cae2324979d70eb8e12ce56fa37e5baca89d74256a0e083d626c0e597985b
-
Filesize
2KB
MD5b96778215635a62a61e4796d1ee4f0fd
SHA1157c5ee5d7bbee44ec527a26a87ad1776bd0f196
SHA2562960f574b951ee70f9b8250ff02942f2ef77f79725e71c41bff572af3f1f9b2d
SHA512f2c91ceb693348736a1ad15e4e6dc00116d37f2b0b52135cf6c7a161d804fb2e222730ed7fec1ea182c8c1d18e6da2b0c99445f134687e2dc92cce7c1df659c6
-
Filesize
3KB
MD51fa5b49374809961ca12d25ed5033b67
SHA1441a64392db970986396229b271099acecbb52fe
SHA25662f5a3e88ffe276bde2807a9c4b951503296d7c78187995c759bd90b57b7815a
SHA512d601e9a19b1b5561b4e0a7fb3f4403b00f4fc6132e3fa22cdb0d3101456050800401a3b92cd9cd1bdc6144ccec6175ada3f478448461a6b8fdb50de34df4382a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD556706d2042521203c1e4ffba12a8c9cf
SHA1d8a246d8023d4ea1e9ad2f4b1579fe8720055497
SHA2560114c38a00c62a6258c22e1851c463c847b22263606131c99c339dba30f003d7
SHA512a557570f19ac144b92a379d250ea89e6dd1e490d03621faee07cbcbb3fac80848dde35a97f65d3d025a322ed17ded5fd43dfcfdf76ed5561a84e98322ed4e2da
-
Filesize
356B
MD545657fe967a2e932dcbc606dab57acde
SHA1544abc04d5ed44b6d53c3fdd1ae2eb6aa1a5dd04
SHA2565e2754415e05225c889f4f8e43be19705e248ff85dd3de695839068e3467d9be
SHA51252bd98b706c41be6c3429573809c56d2912e82789694e91b7bfdadec363582252d0406d633b735898732b1cf80b416844729b08a1168b2e140d04371a90dc8f0
-
Filesize
9KB
MD5106f8d9b530d3c253ac430db785c7a0f
SHA188ab18f0d201db74b1947e890e40df22dee1bb16
SHA256b946b1e1e56eed7d2a9a0c08533135a438ad14e12c66b0d5ee2fc4efa4a2d7d5
SHA512edab003269f1240afdcd779a2f9fe90a42c06364785a5fe578bed6af1f4a91c3490e03700bd4ee420ea6e806d782cdac9bc01cd40182a97bfacc37cf60cd3c44
-
Filesize
9KB
MD59f96491328eab14be523653c8d8e84f9
SHA1822294b57b85a3f35a0b64a901620a1117718c86
SHA25631d4e6074dc90243ecd32f2ae56d09dd5e115148a8a1f234cb8ce87eb7d4d98d
SHA512a9b1b46f721c81f4cca31c07834796fb7515324ec66aca0417424286b84a3d61fd8ba0cde738ffb911628a86281b176de88a6812461b101d0967e5de35ca9cc9
-
Filesize
9KB
MD551e3a1c3536eb8f2eff84387c8d91b30
SHA1b5aab2fcc26af73e50a65426e60267275008e19d
SHA256ff7d8ec1f3165488344c1de9600552db813bd08cc9bcff99ac0ced9ce5a01272
SHA512741a8b0c1909894908da0e51de91dc034734c293dbee448b9e7437a528a58907bf195a824fbdcf25631e99347aaf415225bfa3e86bddb7b2393b23a8fa38a11d
-
Filesize
9KB
MD5095f8f930458fd013b9739efe83e9580
SHA193da38aebc2a3f447ad4abfed1d084e3ba12f021
SHA256d9e0e5f6c65269383d84b82e467a9264a16be4cc1e22ae49f93d71adbea2179f
SHA5122324b1ef20c5cc6466ba7911863ebe3092635d5630f1d13eaf830b7c589d7aee390c47ac71c62f078c99b1f751e4871adc9dc31f39400d77ad9058db6f511f1d
-
Filesize
9KB
MD5c31161cd28a0bbda16e5be218ef11acf
SHA13f318fc2b1bd0c70008e873c47b75617ac323860
SHA25696bf7a69337cb014ddf2dc00d7db401cb1f3c4efede029ba203562cf41272da1
SHA512ef6939beccf417a822415d6454835fe57a623544a2f607de7d4173e8c94b94e14d103232aecac15061fe6f8194559cb76d3dee0623cd07e858ad362f2ebb9f66
-
Filesize
9KB
MD55a64dca02f111e7802a52cd9b2bf1c89
SHA1e8548247d19a4cf9e134e659e5ebbd5be1cdbe33
SHA2561e23a4d55541e3fdae76564d8fa217d7ee0f1b484dcc38b0c59bdd4a3f0b9440
SHA51293f88038ee36d865be2caf0235f6d125d1bb7352901d06643af9e3add697a5430b3155604f3aac7a46838eeae5c8fe2a703e6247223a8faa7c42cae8ec4d33fb
-
Filesize
9KB
MD5e6d1ec33965a077b4eba3642ddfa66a1
SHA12c723e4877802fb5b84f4a03e96fe4cadb07204e
SHA256989aace493a9bb77ead9c188f993828694e614bc5e43780a79c2cd4bcf95fd94
SHA5121da27a9739584515bb5869609118794c1f1e353cf542065ae93e4f45ead15bce668c4e2a602e70147c66689b1776ad61a2eda9de1041e210f9853f8ad7166eb2
-
Filesize
9KB
MD5d166ad41df441b946d4c232cd66ba7f5
SHA1deedcba6f0fd0ce06d78b63c9062777f4b00f62f
SHA256e4a3d55b91ba2a6ef746e38cd11b076ee50e8d3c33a3c79d02c76feff153aff7
SHA5129d829f14168d2b63b75bbeba0da56b631f327b92c2bf376cdc5c1157060495cbeb9f4922c0ba2cd8736b66eff8461fae38967d6afbd2d2f9d022249c48f7b5f9
-
Filesize
9KB
MD560cfd008b44b0058ef51e20a6be893b0
SHA1250d4c64ed162bc00e91b1b9d63a246a454aff57
SHA256277c40e5d83ee3702466a4e15b04de94b99c9eb9bebfe9ed1096493a4ed543ba
SHA51261bad7ae010c5cc731515de1a2e576a1e7efff50a0739969347756542ee18149e93a9d017233fc90d6233d3070c4eca0506637027e3bbd87a8e099f69fcf23cf
-
Filesize
9KB
MD5fc5a30a32616015e653fa30be5183d19
SHA120907011728ec839153bc59399b92f6a8ac2ac3b
SHA256ce453beff70053165ea2f17092e9ca915fde790a4d8ce2756deee3b6443973b4
SHA5126bf7c5a611832c7f167dac48437f599b15cef889c42b46c707a7039c566f9fcaa300e7c2bdc3af9588978822292dc45b3808df7dda82a63e47a085f755f8ac49
-
Filesize
9KB
MD5418cdcf8ff270f9cc5f76c39c438a29b
SHA154f72a0c34fe05d0e29304f4faf5864806f2fbce
SHA25689bf7c688a5c65ed50f0d0e95bcee412949015a27e6dedb272ec7052471eefdd
SHA5122b376455f38539357d68a8223ffea98d4078be8d3f3414e19b8322114619833568dd9bfa4dbc97deb2ec5e8ac21856d3059854f3169e279306bff91c5187450e
-
Filesize
15KB
MD558a0826f037fb58a0a97ab22b58ec1ab
SHA1c073cb703590a759359fe501e60623b3b6736395
SHA256b88894f0ecee1124a894d8016f431c34dfedb8419da7e180b6ace2e731f469c3
SHA5125a79395a44f298be882626cb455b308f6e336a07a6aa9eadfc6be3287b70a8d9a2cc4262df28c8155614e868aa33cac756deaf51a71abe1ee61954fadb8e8097
-
Filesize
101KB
MD58f17dc7c27aaab331168a66a8dd51a94
SHA1e7a600c84324d0b4658ae4043cc0bf26a2178c41
SHA256476b3fc452eb026ab67918c0920b97ecfa042fa988550e518e9d3f095ddee33c
SHA51280adbf5a0b3dd4a651763ca7bb79ce0880546e05e81a94005dcad4f1a5583fd7c8f2b7bef0844474e316b718609c725d5f19cf0d9adb275c3803f862383cc15a
-
Filesize
213KB
MD5450752f631a2edac60b0acd23cc0e0f1
SHA179767f21ea14299313e8a1bb6bd15274926ce036
SHA256db3bb85964bcd459e78c82567ec008d5c89dc9140be01cc631d01460e330e9d9
SHA512d1c0d02532f6a5e684ab2c1981942f1f48b31409afbcbdaf3436712efb171278e2b2ff0086aa43625e121d737e885193de0bd8ff749bbe011cb39863efa01884
-
Filesize
242KB
MD5aeb92bdb638afb99a6b8f4ac5fbb3982
SHA1523c5dbe0be83b84ce0d869e153a40aadad622cc
SHA2565cc68d4db4a22efa5dbddccd2aefa52f1e2a75f57d31bb450c2723f96268d551
SHA512d20182629bd22520316006e0a6825ccfa748530faebcec5722423a3442452ddd7047023b738d79ffb9b5cba6e4586668a713f3bd50201ff8866680ffc5b01d22
-
Filesize
213KB
MD50b75697e4aac1fa42e55acaaa21b8390
SHA15b31d668e217c3d9a8b7c682d77739d629dfb1e2
SHA25637233cee3bc311eb9e3d0bdcf49dd6688861c277f18853b49687b11b4657a212
SHA5122e889d60f1ee8fecff463196d5f9fb7a30fabf0d8bbc05cef0e39b99e8d8418ffdc44ae77ec7fe9a808fa0ebe7c7a21132a5799d467d19387a651f72b942fcde
-
Filesize
213KB
MD5a1e19f8a01f334cca6ef7b95ff4c2823
SHA19f03eb418865da7e041f2f4a313b96a91f44194c
SHA25671dfbb4b287a0a41bde32026bba41b0f2efdc7456ed00be3ba1137962da11cd1
SHA5121ca9fe5e636e9f2651199a4c50556cf97d7bc9a7e8a5c287a1767c86d1d34c1b2f0fad2dae54323fb8738c764fe1b4e1d53818e7198924d7c844c54f5194b325
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e