Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
22/06/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe
Resource
win10v2004-20240508-en
General
-
Target
495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe
-
Size
1.8MB
-
MD5
6c580737fcc23a9ed675109cfca13b36
-
SHA1
b95e037a212f638938536121a39edfdcd77e8873
-
SHA256
495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67
-
SHA512
9b5665671b9589df20a16a6f472d4500ffc1f4282911f1829ae3380da195951dd9c60cfd18127ae1cced5dac00472e2017aef13bc55035e96f51de13c72fb7c2
-
SSDEEP
49152:INuU9sUb2XBtUHGfscA79k2K68IL8GyJn/zk2sEz4Mfm:KuOb2R4GkcA79rK68dlnhdfm
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e1a82ad78.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d10f27310b.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e1a82ad78.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d10f27310b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d10f27310b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e1a82ad78.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 5 IoCs
pid Process 1216 explortu.exe 3080 d10f27310b.exe 3612 5e1a82ad78.exe 1384 explortu.exe 2768 explortu.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine d10f27310b.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 5e1a82ad78.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\d10f27310b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\d10f27310b.exe" explortu.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3612-114-0x00000000007B0000-0x0000000000D11000-memory.dmp autoit_exe behavioral2/memory/3612-144-0x00000000007B0000-0x0000000000D11000-memory.dmp autoit_exe behavioral2/memory/3612-151-0x00000000007B0000-0x0000000000D11000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 1216 explortu.exe 3080 d10f27310b.exe 3612 5e1a82ad78.exe 1384 explortu.exe 2768 explortu.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explortu.job 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133635198940530516" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 1216 explortu.exe 1216 explortu.exe 3080 d10f27310b.exe 3080 d10f27310b.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 4252 chrome.exe 4252 chrome.exe 1384 explortu.exe 1384 explortu.exe 2768 explortu.exe 2768 explortu.exe 2464 chrome.exe 2464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe Token: SeShutdownPrivilege 4252 chrome.exe Token: SeCreatePagefilePrivilege 4252 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
pid Process 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 4252 chrome.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 4252 chrome.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe 3612 5e1a82ad78.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1216 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 78 PID 1892 wrote to memory of 1216 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 78 PID 1892 wrote to memory of 1216 1892 495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe 78 PID 1216 wrote to memory of 1172 1216 explortu.exe 79 PID 1216 wrote to memory of 1172 1216 explortu.exe 79 PID 1216 wrote to memory of 1172 1216 explortu.exe 79 PID 1216 wrote to memory of 3080 1216 explortu.exe 80 PID 1216 wrote to memory of 3080 1216 explortu.exe 80 PID 1216 wrote to memory of 3080 1216 explortu.exe 80 PID 1216 wrote to memory of 3612 1216 explortu.exe 81 PID 1216 wrote to memory of 3612 1216 explortu.exe 81 PID 1216 wrote to memory of 3612 1216 explortu.exe 81 PID 3612 wrote to memory of 4252 3612 5e1a82ad78.exe 82 PID 3612 wrote to memory of 4252 3612 5e1a82ad78.exe 82 PID 4252 wrote to memory of 3164 4252 chrome.exe 85 PID 4252 wrote to memory of 3164 4252 chrome.exe 85 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 4424 4252 chrome.exe 86 PID 4252 wrote to memory of 3492 4252 chrome.exe 87 PID 4252 wrote to memory of 3492 4252 chrome.exe 87 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88 PID 4252 wrote to memory of 4608 4252 chrome.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe"C:\Users\Admin\AppData\Local\Temp\495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\1000016001\d10f27310b.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\d10f27310b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3080
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\5e1a82ad78.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\5e1a82ad78.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcb57dab58,0x7ffcb57dab68,0x7ffcb57dab785⤵PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:25⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1900 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:85⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2204 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:85⤵PID:4608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:15⤵PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3056 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:15⤵PID:5016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4168 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:15⤵PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3212 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:85⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4380 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:85⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4568 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:85⤵PID:5072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1500 --field-trial-handle=1912,i,12873283290758889524,363630493601861675,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216B
MD5eb4bafb6a303e0992a5dbedbd70ee89e
SHA18127ca2c372e2d80605d982161525bd50cfcaaef
SHA256d190b9d7d4337f2c89b762371332ef0715867f97465c8ecb68c6f175d23cca59
SHA512400e7ad415238117be277662f744b022f01295661775a853aa87f32c586ec0cbcc3ffe51a5bd4c446c69bc5a0d6b6fbf186eeb7609ebf517dd958a5e81c45126
-
Filesize
2KB
MD5b2761c01c0e8743fe8f3e985b221e9b2
SHA1913809ed3af8dace783c07c1285ec099e892b7e7
SHA256b06ed51f81a5bbaded89c8871ffd12c31dc3e90ef8c005506364a3847da865ff
SHA5122bc05bb9cb9f6670278c178d7f8f3b1855457906eac156c4536dcaf99cd98fe2d1d832cf0b1e551648e2de9870cd1451f951f9974eba20662a69b0553d2fce05
-
Filesize
2KB
MD5176fd268d2e4dc00bb68718b656c69ab
SHA1080e70fa04745306a31e9f39036594bbfa2c5de3
SHA25646f7d6346f28827f8195d6377b8a5304a3495e59b82f3bbb9c5026356f2036c5
SHA512e5a107292a63b413b6522c0c57ea44e0f46913e7b0f1eb604862d8358dcf5c3259b08cbcf8f50efec3bff302fd47f8d513a0ff7ff33becf277654629bd1da0c6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
692B
MD50be7361c5663c287b91b0832dada8c09
SHA12d3215d5d7173b68541de7404cf6d206174233c6
SHA25645b06045f02fed89252141d0034cca6973ad36e46c39f255f88d7a28044b944e
SHA512960b2d9d7fb12d37339c7df0fc7b8696a1458f7f0f2b47d2c0509dede6544ee818cd162ba557dcc825c0a8a055bec253ced79b31a1093aca6e581b139c99d52a
-
Filesize
7KB
MD501cebeed9e87c223cf103f22655dfccf
SHA12b3b88da506d01c292e78340b964222a07768005
SHA2561cae7d445fafc28b176ccb5e5e805d7da8dc4a1ebaee8289de4cd89a0ec63809
SHA5121a860a357d42d5408ae55479728b7dcaede71e0e06accde1f10aa0087888bd8becaf13411d992e296d875593867e19a9d5e3115920fc63dbfb19373dc132a650
-
Filesize
16KB
MD58ab5f7e2e14b41279ae3dbb632985900
SHA1a8b8b36664c0e0fb8fa8b085275efa57dfb1744c
SHA2565f7eb7cc2b052dfd9cce23bba9d55afaf152898bdb83d7652809ec6d4e52f208
SHA5123f62a61139404f5e154222196ff8fdbf9562162622e4c2ff512d4fbed00e0c2b924670ad670a1b6ea8158c712e54e6f9ef8ef13c26a0c79f59bd12e387a8649e
-
Filesize
271KB
MD5a6bdac512d79374eb9078cee0cec1d45
SHA13763c5452fa2695976b7d617b85b35862325e76f
SHA2569c5f184e4b70e3d752f2d34873c0d50a48dcd55c0395e1c31e3a5c0466ff6b51
SHA51220f77c3579ab00628e0b8593f7ca10dc9aaf67726a02b2063b99fbe231b8dd98b57ba608dde72ba464dca81f6f5baaf29952cbff99838121fbf51a0d14fc9e67
-
Filesize
2.3MB
MD5c4321f4901b4272f2d51aa2b3da1e5e3
SHA15cb61427ee213070cab21415d4dc84bf232f0bbc
SHA25653f96c9b90d516e965a51b6ccbdbe8067ae3af02d57ee1be98266862ccb3421e
SHA5124c7c5221e5f0a8fee2a2d671fd8b132bc635bfd9977cbb788f72df7011ac31d1da361d6ed6e2e5489439a43948cb2efb4f2610c1505c8a7ecfdb0726f372bce8
-
Filesize
2.3MB
MD5209916ea8e2c521e4cea854aa6c40f88
SHA1c1a20ba139f75b2b8de1b8405161d4a461803d3d
SHA256463a99fba1dafa18713503a22c8202e108661e4206b2c21218d4e19ef2dce286
SHA51245cc2bb839a39de5e8a871d558b3c4827940d10150ccdea02ea9a8df0a4164fe4394a7d2576e2fd3ddf4401ce5eb2d288e0f3144e5f7826179aff7fd21183f74
-
Filesize
1.8MB
MD56c580737fcc23a9ed675109cfca13b36
SHA1b95e037a212f638938536121a39edfdcd77e8873
SHA256495113737ea4a93fda56b460b00a086c6bfe1493234fc9593ea28db53f836b67
SHA5129b5665671b9589df20a16a6f472d4500ffc1f4282911f1829ae3380da195951dd9c60cfd18127ae1cced5dac00472e2017aef13bc55035e96f51de13c72fb7c2