Overview
overview
8Static
static
3KASU PACK ...10.exe
windows7-x64
3KASU PACK ...10.exe
windows10-2004-x64
1KASU PACK ...PD.exe
windows7-x64
5KASU PACK ...PD.exe
windows10-2004-x64
5KASU PACK ...on.reg
windows7-x64
8KASU PACK ...on.reg
windows10-2004-x64
8KASU PACK ...on.reg
windows7-x64
1KASU PACK ...on.reg
windows10-2004-x64
1KASU PACK ...on.reg
windows7-x64
1KASU PACK ...on.reg
windows10-2004-x64
1KASU PACK ...on.reg
windows7-x64
8KASU PACK ...on.reg
windows10-2004-x64
8KASU PACK ...ts.txt
windows7-x64
3KASU PACK ...ts.txt
windows10-2004-x64
3KASU PACK ...ER.reg
windows7-x64
1KASU PACK ...ER.reg
windows10-2004-x64
1KASU PACK ...on.reg
windows7-x64
1KASU PACK ...on.reg
windows10-2004-x64
1KASU PACK ...et.reg
windows7-x64
1KASU PACK ...et.reg
windows10-2004-x64
1KASU PACK ...ay.reg
windows7-x64
1KASU PACK ...ay.reg
windows10-2004-x64
1KASU PACK ...N).bat
windows7-x64
6KASU PACK ...N).bat
windows10-2004-x64
6KASU PACK ...me.reg
windows7-x64
1KASU PACK ...me.reg
windows10-2004-x64
1KASU PACK ...GB.reg
windows7-x64
1KASU PACK ...GB.reg
windows10-2004-x64
1KASU PACK ...GB.reg
windows7-x64
1KASU PACK ...GB.reg
windows10-2004-x64
1KASU PACK ...GB.reg
windows7-x64
1KASU PACK ...GB.reg
windows10-2004-x64
1Analysis
-
max time kernel
78s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
KASU PACK V.3/Disable Telematry/OOSU10.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
KASU PACK V.3/Disable Telematry/OOSU10.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
KASU PACK V.3/Disable Telematry/WPD.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
KASU PACK V.3/Disable Telematry/WPD.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
KASU PACK V.3/Input Reducer/KeyBoard_Revert_Optimization.reg
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
KASU PACK V.3/Input Reducer/KeyBoard_Revert_Optimization.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
KASU PACK V.3/Input Reducer/Keyboard_Optimization.reg
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
KASU PACK V.3/Input Reducer/Keyboard_Optimization.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
KASU PACK V.3/Input Reducer/Mouse_Optimization.reg
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
KASU PACK V.3/Input Reducer/Mouse_Optimization.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KASU PACK V.3/Input Reducer/Mouse_Revert_Optimization.reg
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
KASU PACK V.3/Input Reducer/Mouse_Revert_Optimization.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
KASU PACK V.3/Ping Tweaker/Credits.txt
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
KASU PACK V.3/Ping Tweaker/Credits.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
KASU PACK V.3/Ping Tweaker/DNS PING REDUCER.reg
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
KASU PACK V.3/Ping Tweaker/DNS PING REDUCER.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
KASU PACK V.3/Ping Tweaker/Ping_Optimization.reg
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
KASU PACK V.3/Ping Tweaker/Ping_Optimization.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
KASU PACK V.3/Ping Tweaker/Tweaks_internet.reg
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
KASU PACK V.3/Ping Tweaker/Tweaks_internet.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
KASU PACK V.3/Ping Tweaker/low_ping_and_delay.reg
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
KASU PACK V.3/Ping Tweaker/low_ping_and_delay.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
KASU PACK V.3/Power Plan/Max Performance (RUN AS ADMIN).bat
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
KASU PACK V.3/Power Plan/Max Performance (RUN AS ADMIN).bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
KASU PACK V.3/Regedit Tweaks/HoverTime.reg
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
KASU PACK V.3/Regedit Tweaks/HoverTime.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/10GB.reg
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/10GB.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/12GB.reg
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/12GB.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/16GB.reg
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
KASU PACK V.3/Regedit Tweaks/Ram Tweaks/16GB.reg
Resource
win10v2004-20240802-en
General
-
Target
KASU PACK V.3/Disable Telematry/OOSU10.exe
-
Size
1.8MB
-
MD5
3fe356ff0e52f84abddf53238eec0fe6
-
SHA1
874864626861a178f02116228e176f2a41620583
-
SHA256
7335914d30d8ede5431c4ba32f56a79a397a6f38bfd44e90f62324f63afeda65
-
SHA512
7dd811acc085c9dce88a3465b91c00057c4fc9f750c37fb37fb88f9a17fdbb2e3984b03938c7e7c6ab6fa8e9e39746aa5a542c23274b6724d056ea5c55d742be
-
SSDEEP
49152:sEublE2XwGw4JEJTJxJxOrOrY98Hanit8LsfeB/eR1xO:i9uWkKeR1w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe Token: SeShutdownPrivilege 2540 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe 2540 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2112 2540 chrome.exe 33 PID 2540 wrote to memory of 2112 2540 chrome.exe 33 PID 2540 wrote to memory of 2112 2540 chrome.exe 33 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 2184 2540 chrome.exe 35 PID 2540 wrote to memory of 676 2540 chrome.exe 36 PID 2540 wrote to memory of 676 2540 chrome.exe 36 PID 2540 wrote to memory of 676 2540 chrome.exe 36 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37 PID 2540 wrote to memory of 792 2540 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\KASU PACK V.3\Disable Telematry\OOSU10.exe"C:\Users\Admin\AppData\Local\Temp\KASU PACK V.3\Disable Telematry\OOSU10.exe"1⤵PID:2940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6469758,0x7fef6469768,0x7fef64697782⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:22⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:82⤵PID:676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2196 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:12⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2204 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1404 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:22⤵PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1440 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2792 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:82⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3944 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:12⤵PID:2252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2168 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:12⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=1396 --field-trial-handle=1280,i,12044177344445955236,14375176280744347057,131072 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD55f9237ee144e19aa52919e703ee40dd8
SHA16399e9cae51dd6bf18d7e1531a1c204bcfcd83e0
SHA2563024cbe289a289461ab96ad8aba76ce7207fb129fef0b4ba7f5a371d24a485b3
SHA512d7d20796f9cbc2ca88f9bc1b2165fb7210bbd62f0eba4318a6e8d5c6dc9192210d37e90d34e9ff2d4f9884a4b06fe579d7ac5a0825da45124c4a58026db94139
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
168B
MD5f05023bd1df47c92470cb09f83630b68
SHA15dfa49c788097ef938a33a3b94c5167cbb9e7439
SHA25623969872c5d02412408e8e3df1acc049fff38a46e5b0818bce94d836044a5827
SHA512859eed065d8dc78916e1c5b214570727d7be469ebc3b4f3eb8f60d38ed41effeb919645385383e12fd7bbfd97720f15f4d62db2e739dddeca2dbe35ee23e2a0c
-
Filesize
168B
MD5ac046081999f7ea80e9c30737fcf4412
SHA14b3bb50126635985c9b913ba1d11b10791e9e161
SHA2564c8766f661f8bc77befba6b323fce58ceb5065678e066e103f0719635e028219
SHA512ca75392ed278150b1782260ed14b63e5acd0da9473cc7c951c73c6dcd790e9ef814e78ae91928039f1bc941af558e9cec4dfaac9039030235c49ed11643daf27
-
Filesize
168B
MD582f5d695ab018a3bc12a9f2d1776673c
SHA19af2f078efcc1ff7c1560e32bbb157a0aa736be6
SHA2562a53674ed9b36762d9e59d1dfa82fba5c404498bf7d8c6121a92125c108e523d
SHA512c6d852fcf317ee9f9b224e3f8e4535fae9d5aa0d0f2ca50883cc0cf277332140c6c1ea9d2c06c15e1dbac66d4f55e548f9c0d9a40c71851fccce34f507fbdaf3
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5335e1683ff00c515517b9fc214e80f77
SHA14b989adf04fd4e377f1aee259649cac04c449fbf
SHA256c3ad47bdd6b5e50e91373989d5a1409e0b1c3a4940018b7c6bdc6a1585323fa5
SHA5122aa615a168a998ef0f2cad9fd4dccb8e57cf33b40b5ea41a395eee5b530b10a696b78f6191744ae070357ad9808069e52dd48e72eb54a08dce6ade703e7b332a
-
Filesize
363B
MD56c7cec60ed5660fdded4d60fef00b7a9
SHA153f3a5a8631734b89dc5f82beaa4bdc82c3e6dc8
SHA2569b2bfb777024cca6509cc203fa26fafdbbac914fbc56b160cf5940c57df33636
SHA51264fcc2413094ccaa38fa38045bdd768de0ae6849d1b098cbd41fbca3981827c8fe045962e6cbb335f345dd7c9072ab235600692351644b4159cf2cc665b07f85
-
Filesize
6KB
MD5dc86ea5acad2cd65788adb6d2fe79185
SHA128521a412075aae28cadf7cf237ec4eab65ad769
SHA256eefe45faecf5b252c9827465f38aea5ee16f6a974d6be6dc569021d02602b726
SHA5120714bc5bf2fad4a77845360c45f6cd05aa76b5e5b276c3707d1248f59fa89a06fb496bbac9e113b5017de5f4c6574af08b5b8131416e1d7bf0c980615e5413f2
-
Filesize
5KB
MD5f2b0ee62b526365b859f840e790aa040
SHA137939cfdaba08845c58aa3b2017b5cc91b3a18f8
SHA25695d691b589ef88421f84b0c558929b61a14819ec5127568863ea88590cc805aa
SHA512644015560f2582edac4e0ca23f57f23d37f7c0ed336ecbe1ae82bbf296f1a34785742d40cf88c5675c45bd465b2c7df7421cb106d8f4068e89f37ce22eafc752
-
Filesize
6KB
MD51065f8d8f90df59b0894f1f0cbf59f6f
SHA102c42b2ef0d6de09bc8cdae212a0e1b4b82f686d
SHA2569355b3328bc96be3fe73076f4eff9936ece035c6ceccbff6c0b040b2dda64ca3
SHA51289e6f3db53dab5d11e8e622a0c46b66333168d8e6b2f28e549c363a08f1e8441dad4272a4abf3e175915a0fe7645d56ac2e86da94ff6ad9c1f1bd524ac6c7e7a
-
Filesize
5KB
MD58e405d70dc76457ea17b589fd8b95eaa
SHA11851237326705f669cd65cd893bab75543307ad0
SHA2563414209b73cda86da40ba44ebe826bbb31f08fd2bedfdcc5b5246869c6f7123b
SHA512625388b64262c723654fab9e1c01a7f5cf43c1ce9513f3022d1c2d4fa8d16a9024c3ef38b1595a556ddd36556cd3076c226d204e8e9b8ce0b2fc2a336f6caace
-
Filesize
6KB
MD513ffdcac1343ba530817453e2d5f340f
SHA1a1ce237d2df63510d5e93f3292411573bf9635ee
SHA2562c0b42b19bc503570078b7e426a9c0bd015911ebc851618d3f0b024b6104ccc7
SHA51270cb18207fba74de78f07325d438501b47212ed81606accd75e281d8fb070cd22d6d52b9af90614fad343433d30c1634438635abb4a0c2664f6dc0cc48d70c95
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
310KB
MD5bc9daed1f9264983aefd1bf2447b78b9
SHA193ff2a43f5c6b7a09ce23c38845d188f568045ce
SHA256731ac836c95bc933d8cb8c5a49396d60c851543b399d7692f732994294bd8dad
SHA512de424a52ec62f083d93c1afda9b13eaf5930ec62b13413a74d9566638f3e7c36053a1149dd55fb79e29bb57cc4bd20ef7bcb5f4f90d544dc3d797195a412ffae