Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
05/07/2024, 15:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://plsgift.app
Resource
win10v2004-20240704-en
General
-
Target
http://plsgift.app
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-661257284-3186977026-4220467887-1000\{10CF697D-E739-49F3-B784-904AD2CDD90D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 chrome.exe 920 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe Token: SeShutdownPrivilege 920 chrome.exe Token: SeCreatePagefilePrivilege 920 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe 920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 920 wrote to memory of 3064 920 chrome.exe 117 PID 920 wrote to memory of 3064 920 chrome.exe 117 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 3412 920 chrome.exe 118 PID 920 wrote to memory of 1124 920 chrome.exe 119 PID 920 wrote to memory of 1124 920 chrome.exe 119 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120 PID 920 wrote to memory of 4760 920 chrome.exe 120
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://plsgift.app1⤵PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3948,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=3960 /prefetch:11⤵PID:404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=2820,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:11⤵PID:3424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4664,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:11⤵PID:1732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5492,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:81⤵PID:3624
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5528,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:81⤵PID:2396
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --field-trial-handle=6044,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6052 /prefetch:11⤵PID:5100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=6188,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=5132 /prefetch:11⤵PID:3484
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --field-trial-handle=3860,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=3852 /prefetch:11⤵PID:3708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=4088,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6684 /prefetch:11⤵PID:2600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --field-trial-handle=6492,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:11⤵PID:536
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --field-trial-handle=6308,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:11⤵PID:1412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6372,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:81⤵PID:3388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --field-trial-handle=6708,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=4868 /prefetch:11⤵PID:5080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=6352,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6324 /prefetch:81⤵PID:3504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --field-trial-handle=6992,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:11⤵PID:1424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=5796,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6904 /prefetch:81⤵PID:3392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --field-trial-handle=5064,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6348 /prefetch:81⤵
- Modifies registry class
PID:4240
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --field-trial-handle=5724,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=5848 /prefetch:11⤵PID:224
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x410 0x50c1⤵PID:60
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa35b0ab58,0x7ffa35b0ab68,0x7ffa35b0ab782⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:22⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2036 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:82⤵PID:1124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2304 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:12⤵PID:3912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3568 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4632 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:82⤵PID:416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4772 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:82⤵PID:3284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:82⤵PID:5136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4932 --field-trial-handle=1952,i,6044253229964347703,10864250563705289583,131072 /prefetch:12⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=5164,i,10426317566413639638,17907471819827662535,262144 --variations-seed-version --mojo-platform-channel-handle=6696 /prefetch:81⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
168B
MD5b0a0d5dc487b855ea7fcb9c394e8fb2f
SHA19db6411cfccff43e87976648617403e990744fff
SHA256bfcb03e2a08388f2fe1849ced30b97405abae6b4984addc480774d747ab33cf0
SHA512c90cb7c41d399fce6f3a4a1d0de35bd7dc93a2d693cbf045ebed87ead03fcf950645e6b13efe23e8da0629e89d2213a825b01cddb24b0a910f58570519c3bad6
-
Filesize
1KB
MD5c293f2af20790d32ac95d2c26f119508
SHA1ed60ec98f08ca64727b51c0497fe0d7ad7629e6d
SHA256d1008a35ce0d6544ae3ae5d09571cdbf016a9ddf9c7a84bf8bd84f9275896c1f
SHA51298f062589ade21d3953bf8eaef0637255583ce57e46f247a927900de4aa8a5109db3fce61d6d1c387b24f9e790557d608857a1207e72d8fc1fce0340eaf8fbe9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD55ccf4b343f22c92171cbb7c0b6d6a08a
SHA177d4795c37241f14b5ec7e2d9cc74463cf5654d3
SHA256db9f0cca43e833a96638c7ceefd1827ef4f73044e156094b4471c45d1641ea2e
SHA5122c466fac8f5eeab47922f59c183941f840e7e6cb6e61b7333c6677b3202fad90ce50ce1216172c613c619b7547655a784e70478bb78de6c6ab332dd762d8cabc
-
Filesize
354B
MD5b8bec5781f2b1d0f3bee36fc083df81b
SHA17e0b743b5d0d7d6fd55ce4fa147f559b5a3af088
SHA256f3a1af18540f1b33e59fa5584dd4a6af8f288975f753932cba17134bc760041b
SHA51231e9e695c69f4cb58a881e1c0b9a49163b276c6ff81c4d44a72c422c7bdccf7e275d92b4dc12ccbad00ffc5fd5c387a1f4a9255cb45685eeabddd792ca6c0ce4
-
Filesize
7KB
MD541afed05198c936f1d10c6d8846a9db7
SHA14fc36f39394343c3b8ee12869da8d441feaa442b
SHA2569a10a822bf8cdbff457ea86cb7e8df5cb4a1852c9bf28c6e0349fdd0d833cc9a
SHA512ff41757eb6a020c9b539db0e33e577cad0bda9e113fc7755f274af0fdfdb08d1a3a26f23d0e1002a67c3fa1b43fffb0fe06dfe422537b50dc5edf08ae8537f18
-
Filesize
6KB
MD52fe69ba0d274de23aec5b51a11d5bb28
SHA1d5b512fdbdb19eb8426d5de9cd0df9ccd12bee0b
SHA256ccfbf73dea6398b34cc8da40b12474f57b803daed8b07766c93d9c2e7c5e2f1c
SHA51294d55946b9c4abd6dd06dc2c1c327e353c2e2f801cd48f77455ac1d5f4c690afa36cf202ab54e66c5477beae15989b69a4071d47f18796afa4dbc4dcb9c9937a
-
Filesize
6KB
MD52af3fb9c16e33e487595f953c4728e18
SHA1af46a7ffd45f01224a7d79ad46c70147416b89e9
SHA256a1be651b4e309d17685aa03df2f587c38a7312145d21cde1c270115828938d1b
SHA51241edee908cb03fcdef3465af3d125249090cfd92d759d790c42cd66aa8d089a93cc8333bd59a882878b3d06c957bf855636247590b9031ed1efc2bcce394c527
-
Filesize
16KB
MD540965cb4c9cc81529ebfd14085016662
SHA141f0fd22df9ad504fe4f41983ab7195072a6eaf1
SHA25625dde2ea3f6411a3b76fb6d4464665e0a88b94587e6264b84f25e24d7fc9b237
SHA512903a693de73d93f2460572915cc44284d36c4b13c361d7087216a3a815c8e6d949e93fa67919ee40d9734ef939f65160bb1919ef4925493c16940b0026929fe4
-
Filesize
285KB
MD529317c399bb974919f6e500ec4e91f2f
SHA10a5454e0bb46d806b1c10f3f620e11b22f175ace
SHA256ca5017415324199dde7def5a31dd90c927c48f910cb9abbcddcf2a74f5aced36
SHA512cb463feec08d5bb35f2b121591c208f3ed542d22a19b28dc70dc6146d02ee376afc363978e6afbc5cc7da1e4ca8ca6bd8a68f5d4d217506907b2116b78f1a649