Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/11/2023, 01:08
231122-bhe16she43 822/11/2023, 00:55
231122-baa29ahd77 722/11/2023, 00:52
231122-a8le7sac31 322/11/2023, 00:44
231122-a3kaysac2z 722/11/2023, 00:22
231122-an7spshd24 8Analysis
-
max time kernel
36s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/11/2023, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
SKlauncher-3.1.2.5.exe
Resource
win7-20231020-en
General
-
Target
SKlauncher-3.1.2.5.exe
-
Size
1.6MB
-
MD5
a3eaae6bb7e01e8059f1276ccb7f6c62
-
SHA1
801b7bb06be83f057fcf7d84c119e0ccb6310386
-
SHA256
6c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
-
SHA512
57a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
SSDEEP
49152:HIBc3nWdsIp8gClzw4Kz/q4BkkKlWThSorx:oB/Eq44TBTKEUor
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe -
Suspicious use of AdjustPrivilegeToken 60 IoCs
description pid Process Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe Token: SeShutdownPrivilege 2368 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe 2368 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1748 2368 chrome.exe 29 PID 2368 wrote to memory of 1748 2368 chrome.exe 29 PID 2368 wrote to memory of 1748 2368 chrome.exe 29 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2740 2368 chrome.exe 31 PID 2368 wrote to memory of 2816 2368 chrome.exe 32 PID 2368 wrote to memory of 2816 2368 chrome.exe 32 PID 2368 wrote to memory of 2816 2368 chrome.exe 32 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33 PID 2368 wrote to memory of 2692 2368 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"C:\Users\Admin\AppData\Local\Temp\SKlauncher-3.1.2.5.exe"1⤵PID:2924
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6769758,0x7fef6769768,0x7fef67697782⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1104 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:22⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1652 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1548 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:22⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3148 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3556 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3700 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3720 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3520 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3948 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:1816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2624 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2496 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2732 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3396 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2304 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2624 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:12⤵PID:544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4320 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4344 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4452 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4472 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4524 --field-trial-handle=1312,i,9124013363931869542,15057871962429656912,131072 /prefetch:82⤵PID:2456
-
-
C:\Users\Admin\Downloads\SKlauncher-3.1.2.5.exe"C:\Users\Admin\Downloads\SKlauncher-3.1.2.5.exe"2⤵PID:388
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59f2b98787f775e337bd32e2163fb86f0
SHA1f4564ae94ccb790a3b1b4c93abbff703eead683c
SHA256cac49085abd1b1f5bf06e3df13d08751a70aecb0c1f245e7b6b4eec2313b8f0c
SHA51264a96027bbebf0387b4f360cd3c8ba992115eace8543563dfdf8a3621470851860f2a82cff9f2bda04ba4e341165f5409c81fb95a678fb8d82de413bb1dca253
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD56807c227e63e39303591a4690a122ec5
SHA18d468e4fb90b4d23e0201391c7212a8f314fe8d0
SHA256bfb75f00f388e4cb1ce1348196e776f9a0a830ee90ebb18647dda702c6b26a6a
SHA5121cc82fbbfc739cb0a03f20ac161aba63e5da7be8220cb0dc95f75f9618be5343506affa813b201d1ec1e865eb294631d427127883991f0576facfb91ae176ab2
-
Filesize
363B
MD5400610c2811da0ea2ece8b99fea64519
SHA1808864cc4ae10ddb5242c3bc260c39b6b0c391c3
SHA256ef6bbe3f6c9159effd8ffb67008e785f6485d497d7a97224ec2b90df355c70cc
SHA5126bf865d79ad132e1f68111a9cd5eec388425f9fee23d530a446c79d4e03f29e6af4b39cacecc68b5160e24345f1856998ddb32ec4336d111da877b49b980c12b
-
Filesize
5KB
MD577d941b465ecd63d2ffc5f3055fb3e8e
SHA1a2ecdcc03ab3c800b189e41c99209af9a3aa1c13
SHA2565aa417331fc92acd0cf9005d34ece8ecda878721952457852972e33139f9975b
SHA5129aba7288eb22ad918dcae9b2f9e0f0b424a09adece4eb1babc16a85724f074ce56a9be4fb5f091fb0d311fc65a6d8aa7fb7b09a239c6c4fd229729a5dc0c8c94
-
Filesize
5KB
MD57b5c826c85da9fd5b4fdb10be720ccce
SHA1d8071e9ce2d4ac3d33d0c68e16f0bcfce4eed98c
SHA2562f89038558af894604bf3c7f38b7b9a147e1ceabb87273c3dff8e4f7f6c96a90
SHA5124fbc1d137aca76523f2b5815946e33a9c01ad15ee7d2cde9a4b04a2c03212bcdd5eddabf647f202619ea64aeec422d0723166d8905905b1798d9d8093e5cfc7d
-
Filesize
4KB
MD571ca93a5cee6129b9f9c4ea18ef26fba
SHA1ef25ce039255c8b3c92c3e2ec6249265e71afbdc
SHA2568a3f68da86aad507416b3498aa9143e08e4f95ccf844eca28f407636259a4471
SHA51277f0b6c923681164b612863e6065fdc6e123d14c864802bcf3f19ff5bb106322d48a775eb572d0512fc353f79d46781d1e5a347958802a0ab10627a1952f7e59
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\d81a2aa7-0a81-4898-825a-c667ada7f32e.tmp
Filesize5KB
MD5856a8e835f810cca70dcb3d84ff76ea8
SHA141a2b11a4744520431d8c1ae2e04e351fe374bd9
SHA256d5fd5402d7382532c3ada20c13f9617744537d180ef2b43de5fac539063679eb
SHA512314c64fcfd47908a4ed916a3f73a2de1f22f109209de63ad546176d67628e1654e6432b058812bd35c12f3f591bf4d030e5bbe594cfe141452d5f26f0d053fb5
-
Filesize
77KB
MD5c31479b03f99aff38d71ba4611baa0c9
SHA1ad3b431f87c0d23cf33e08e9cdb3db9d4b084bde
SHA25663389d2051f11f4a2561caa6aa98c7efe5e69456e104081a4bd3f8db216383e2
SHA512c6638cb4edc876b381e110bc8e39d9482b8c036d1ea52ee38336748e75b3a07a4b099c005ca000abacf110a9534693178cb1555bd08b62c0acc14efa9e9eda13
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8
-
Filesize
1.6MB
MD5a3eaae6bb7e01e8059f1276ccb7f6c62
SHA1801b7bb06be83f057fcf7d84c119e0ccb6310386
SHA2566c974aa57734ff98a88b403058ebbc281a7deb311886c4e1697e59a192afc542
SHA51257a21164ca396e36c55d39e553647567399fb9e10b7f08d93c691df714aea1b1959b8c230761445b8e39ce81eb8c65a4d34b968d73f7e649e903d5245320d5f8