Analysis
-
max time kernel
961s -
max time network
967s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19/05/2024, 19:51
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://racheldrawsthis.itch.io/dead-plate
Resource
win10v2004-20240508-en
General
-
Target
https://racheldrawsthis.itch.io/dead-plate
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2852 msedge.exe 2852 msedge.exe 552 msedge.exe 552 msedge.exe 3136 identity_helper.exe 3136 identity_helper.exe 1580 msedge.exe 1580 msedge.exe 5880 msedge.exe 5880 msedge.exe 5880 msedge.exe 5880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 404 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 404 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe 552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 552 wrote to memory of 2792 552 msedge.exe 84 PID 552 wrote to memory of 2792 552 msedge.exe 84 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2180 552 msedge.exe 85 PID 552 wrote to memory of 2852 552 msedge.exe 86 PID 552 wrote to memory of 2852 552 msedge.exe 86 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87 PID 552 wrote to memory of 1168 552 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://racheldrawsthis.itch.io/dead-plate1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb8546f8,0x7ffcdb854708,0x7ffcdb8547182⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:5312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:12⤵PID:5920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,7416694647596380560,5935083585530348711,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5304 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4840
-
C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe"C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe"1⤵PID:5868
-
C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe"C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe" --type=renderer --js-flags=--expose-gc --no-sandbox --enable-deferred-image-decoding --lang=en-US --extension-process --nodejs --working-directory="C:\Users\Admin\Downloads\Dead Plate (19)" --enable-pinch --device-scale-factor=1 --font-cache-shared-mem-suffix=5868 --enable-pinch-virtual-viewport --enable-delegated-renderer --num-raster-threads=2 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="5868.0.1157269706\49762623" /prefetch:6731311512⤵PID:2520
-
-
C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe"C:\Users\Admin\Downloads\Dead Plate (19)\Game.exe" --type=renderer --js-flags=--expose-gc --no-sandbox --enable-deferred-image-decoding --lang=en-US --extension-process --nodejs --working-directory="C:\Users\Admin\Downloads\Dead Plate (19)" --enable-pinch --device-scale-factor=1 --font-cache-shared-mem-suffix=5868 --enable-pinch-virtual-viewport --enable-delegated-renderer --num-raster-threads=2 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="5868.1.1426045878\302861368" /prefetch:6731311512⤵PID:1592
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x504 0x4501⤵
- Suspicious use of AdjustPrivilegeToken
PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize984B
MD58f450e36fe3619e3bbb6191eca00031d
SHA1defbf7e45388854037b2e890c4bdd97af9de46b1
SHA25606d5ddc36eca7d63da0b7ad7cfd175246c44ae3da847c9c8fc1546bbec89707e
SHA512b6c761bd5636551490c442988b8ef6e7f279661ba0e2536ab6720b2a6b2008f6bea129e1ba2c2199aefe8ef9a3201cb83c649e3864003c33c3ec4faf621dc557
-
Filesize
3KB
MD55b681088263711e60459cb0b89c484eb
SHA189d0d1f4914ae12ac492a04608decc9366a64f0c
SHA256df4b91e9ef0228106bc34553815f290c45b43f53f934981dca67853425323d2f
SHA512c612b636c61db1a1c66ded773a95dcbec9827b886a2c33a995c7f3a86daf010985a1eb78ff57d61098a9832fc76ead5a7fface71a2ea5168313c361f922655c7
-
Filesize
3KB
MD5fbf326fd9de125697806101b5eba9648
SHA1b14724f28fea55962ed5937c0d167dbc203fd924
SHA256a292babd76630715a0a9e354ef97a50dc7109a10247d9f460c988a6a9dc7c1fa
SHA512d546a2c4b24840a17dd8120f95112754ae639bbaa89e5b042dd8e1353d5d542667ba81738c078710ba8d32cbe1bd23dad30b73fc354abfad20ce7251edf21c8b
-
Filesize
3KB
MD5fd3430a7705584de68450c63ae7762bf
SHA129b38df9b8e3c0a5ae108c4085d7f3df98a7544b
SHA25628fdac52cc55caad00ae9a72c08b579ff29cd18a19e88cd4ae57bb964c6229a0
SHA512605914ca1df37695b466af0298f42c821b915d36dc3c482ab0af75db7d2f4e3fa3b2a28399f842c8a128dbf24d46582331c7acfcb6d2f3ac8f578bdab59bb0b0
-
Filesize
5KB
MD5dca4f0b4f108fdc5c448cc3ed94c2426
SHA1013d74cd115be504572243407eb0130232dc9274
SHA256bf530bfcb9f57d1c5fbacaf2b3565fa9c71d8e353eb4b153ed62a0c40c163382
SHA512f4eef71bdff2d51f363de9de0b55756785d209c3edd371409a288d37dd696359bb3dd22b1bcd85b05c1b06a5a5502b494c02c44f9b22a98d9ce21933d2981f4a
-
Filesize
8KB
MD552ffec39972ebd6f0da2fa327231354f
SHA1e659a4fa11c7ad65fcc06c365b4c22078f4a6f75
SHA2567dbe64a897ec2200a00578c6d00ebb104bb6eae3eea229a350589d763ba314e9
SHA512b799a175ff87c9da194915c829931f57e2a578bb8f1d213b4182ad0e54e0737f00164f4a8d9e247253463f2e2f193050499527d40223cf543939d086ee4532d1
-
Filesize
6KB
MD52c22c997c7342d97d6b3dc2e98bf6cd7
SHA122d135cbc78e58dae5c1799bf3fe96c8becea1b4
SHA25672d1e703713fa1d4fc75039f60469055f9f77eb7ea5c094955dc7ee4d0f756b8
SHA512d26c4824d990d03c6d2e607c1d1855e9e48338b18c9f3236d333896f577c2a9397d7644b971a3958d5712c999278c960607d1297ce059c0b02d4ddc588edf7ac
-
Filesize
2KB
MD5e9cbeb2bcd495173b1b7c5dbb97463ed
SHA130de15c42748e59d4715c8284c9445b1bf3822b0
SHA2563450992be2a5919a44087eb3f98209ac7da2b1b220e6a73584084acbac78a001
SHA512320031a54f38827fb322cdfc95247467491c8b837f857a2dd953e2c07766fde90724aabd40064dc58fd8069b0e7ee9e2d86bf66a744ea7f39d69e072b89d19c4
-
Filesize
2KB
MD5fae053b4799eb464355d86cb8e840028
SHA141abad78b07beb73200eab54a5875fc19c06ca8d
SHA2566a6ce6e0efcd3ab27e4565f59f98897115567b5f561f7aa418499fc6f2e36e4e
SHA5126710e3b234e0f2645c99826a1dde9ea32981b0e87bad510ac790bfb22b2e5a21d15f3a8630f702af6f90ddac5c94b4b9cc910e50f0248f0f79304220e1658f09
-
Filesize
2KB
MD561e57f2fc793f74976dbff583e9a7bb3
SHA1d3e7c863b50cd661b59828ee8ee9904f2953099e
SHA256c9a313f3194afcb0c41c8afc33bc114528eef31c6effebc59fc90519aed86aaa
SHA51219ea22ec496ceec28b100b92429ba763f88491753219b87cd5b9581035da3bcef6dac896cec6bde95446876e6cd609e0ef372e88dc797be1fec8076ea7927bdc
-
Filesize
872B
MD5364abfe12f9fb4a6755587c5cab616fa
SHA1c73433c2cab481c67c25033b4d4163149e05fc54
SHA256935d3c21b9b4b404c581385e199695ff5f3259222621c97a1cd8c9646dea9f18
SHA512b57f04445d5159b0b3a981ffd9ac70e52223d07840d5dc42508a3ef69fdb3f7d450ba6cf52f9b637d45471810a4e0b92904a703494eaa28d624712c5f0a545ef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5cde050ecc425c6dee0f2a271284c3d99
SHA100d48e9b6839b0a27b7806582f20ac72863aa486
SHA256ec45de19fa276da6b7fe75f8e3b47f65a468b7c1f0bb1c9dda5a6eb73d210dc1
SHA5124a6a2de21e8825c701325b7220ed975a23924b267d4a0827911c498aa0c60242f0b2e42b2b73e28bc0130882f69cc9a87b107cb693808cafdda4a421b217cea0
-
Filesize
11KB
MD5123503614f0d29a8c5acd9bf2ee2de44
SHA1eab0e87d0d5017ec6537addf04ff62ca1555da79
SHA256eb4471859a49371923a5f04995fcdca4b6d154319f403334f6e6292b136c43e6
SHA51281a77a48ec92d209fbec243ac2e4d3f4613dba01798a8816bd01383718873b9fb67ba0b3a811f4cc86180548313e59a3c15396179c2bf9ce4e74256b2e979c1b