Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Worm.Win32.Movie666.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HEUR-Worm.Win32.Movie666.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Worm.Win32.Movie666.exe
-
Size
1.8MB
-
MD5
c2d8e4d54d716a9a971c91a9eac29492
-
SHA1
739f94f80bab2900c604c99b6cb20b00f728d48d
-
SHA256
48cd64aa519a94f81e758f8c492cd6b17afc10fff8c4d37293f2fd8cfe14519c
-
SHA512
05e389d42ee81480f66552ce46abf6b8b3d33d96009b809bfa43680e30fbe67196122dfdd2af648b377c3d6d9edc86e7eabe1bc3a881d57d74d6048238515d4a
-
SSDEEP
49152:5YVWRxf9+CJU5JDMisX4X7mtbqdWAnhxq8:iV2DJSh5ibqAAna8
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 1 IoCs
resource yara_rule behavioral2/files/0x00070000000231f8-4.dat INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation HEUR-Worm.Win32.Movie666.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" HEUR-Worm.Win32.Movie666.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\G: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\L: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\N: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\P: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\Q: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\T: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\U: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\X: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\I: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\K: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\M: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\O: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\Y: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\E: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\H: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\J: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\S: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\W: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\A: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\R: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\V: HEUR-Worm.Win32.Movie666.exe File opened (read-only) \??\Z: HEUR-Worm.Win32.Movie666.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\gang bang hidden shoes (Sylvia).avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\System32\DriverStore\Temp\british sperm [milf] leather .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\FxsTmp\danish handjob xxx [free] redhair .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\kicking lesbian ash swallow .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\trambling public (Janette,Jenna).mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\IME\SHARED\handjob hot (!) .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black beastiality sperm [bangbus] hole (Janette,Ashley).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\config\systemprofile\malaysia porn horse licking latex .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\FxsTmp\tyrkish lesbian action masturbation (Janette,Anniston).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\IME\SHARED\indian bukkake big titts .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\horse porn [bangbus] glans upskirt .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\cum full movie titts mature .mpg.exe HEUR-Worm.Win32.Movie666.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\danish gay voyeur (Anniston,Jenna).avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Google\Temp\lesbian kicking [free] fishy .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Google\Update\Download\african lesbian sleeping legs .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\root\Templates\german cum fucking voyeur ash hotel .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\malaysia lingerie girls nipples mistress (Sylvia).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\fucking catfight glans sweet .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\sperm porn masturbation circumcision .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Microsoft\Temp\gay beastiality voyeur stockings .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\tyrkish blowjob full movie balls .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\beastiality [free] penetration .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\spanish lingerie [milf] feet blondie .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\norwegian blowjob handjob hidden upskirt (Jenna,Melissa).mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\dotnet\shared\norwegian blowjob [bangbus] pregnant (Liz,Kathrin).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\italian porn fucking uncut nipples (Kathrin,Janette).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Microsoft Office\Updates\Download\indian beast beastiality masturbation bedroom (Jade,Karin).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Common Files\microsoft shared\asian sperm lesbian balls .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\canadian lesbian trambling masturbation titts balls .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\norwegian beast [bangbus] glans .mpg.exe HEUR-Worm.Win32.Movie666.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\canadian nude licking wifey .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\malaysia beast nude [free] .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\chinese sperm hot (!) 50+ .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\chinese fetish horse several models sweet .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\swedish xxx fetish uncut latex .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\malaysia fetish girls balls .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\tyrkish horse gay [bangbus] femdom .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\hardcore catfight (Kathrin).mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\indian blowjob voyeur high heels .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\cumshot several models .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\brasilian kicking trambling [bangbus] 50+ .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\swedish beast [bangbus] balls .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\horse nude girls penetration (Tatjana,Karin).rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\tyrkish porn masturbation 40+ .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\fucking handjob [free] shoes .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\african fetish lesbian several models (Anniston).rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\horse cumshot [free] .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\norwegian gang bang public .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\hardcore masturbation nipples (Sylvia).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\blowjob blowjob lesbian mature .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\bukkake [bangbus] femdom .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\canadian action horse [free] 40+ .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\norwegian cumshot sleeping latex .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\kicking trambling [bangbus] blondie .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\bukkake lesbian lesbian ejaculation .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\mssrv.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\action sperm sleeping vagina .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\blowjob lesbian nipples girly .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\horse [milf] blondie .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\kicking beastiality hidden ash .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\horse [free] glans hairy .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\italian cumshot nude [bangbus] nipples redhair .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\american cumshot lingerie catfight granny .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\indian fetish catfight (Jade).mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\assembly\tmp\horse nude public titts .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\norwegian xxx gay [bangbus] cock gorgeoushorny (Jade,Sylvia).avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\canadian cumshot [milf] .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\german action voyeur hairy .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\malaysia porn fucking voyeur .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\animal big feet balls .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\animal horse sleeping (Sylvia,Sonja).mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\gang bang girls fishy .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\cum voyeur latex (Samantha,Kathrin).mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\african handjob catfight .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\spanish xxx handjob [bangbus] titts black hairunshaved (Janette,Jenna).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\fucking several models redhair (Ashley,Liz).rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\norwegian cum masturbation sm .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\danish lesbian fetish hot (!) young .zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\chinese cumshot kicking [milf] gorgeoushorny .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\tyrkish horse hardcore uncut (Sandy,Samantha).mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\blowjob animal girls .rar.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\indian lesbian several models balls (Christine,Jade).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\kicking fetish [milf] mature (Britney,Anniston).mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\beast lesbian vagina .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\danish hardcore nude [free] (Liz).mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\black fetish hardcore catfight .avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\cum hidden (Sandy).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\black horse bukkake [milf] upskirt .mpeg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\handjob beast catfight shower .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\american cum public .mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\african animal catfight 40+ (Christine).zip.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\indian porn handjob uncut (Karin).mpg.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\norwegian hardcore sleeping nipples Ôï (Sylvia).avi.exe HEUR-Worm.Win32.Movie666.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\beast kicking lesbian titts .zip.exe HEUR-Worm.Win32.Movie666.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5044 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 4764 HEUR-Worm.Win32.Movie666.exe 4764 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 5052 HEUR-Worm.Win32.Movie666.exe 5052 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 1388 HEUR-Worm.Win32.Movie666.exe 1388 HEUR-Worm.Win32.Movie666.exe 216 HEUR-Worm.Win32.Movie666.exe 216 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 3124 HEUR-Worm.Win32.Movie666.exe 3124 HEUR-Worm.Win32.Movie666.exe 640 HEUR-Worm.Win32.Movie666.exe 640 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 1448 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 5044 HEUR-Worm.Win32.Movie666.exe 1296 HEUR-Worm.Win32.Movie666.exe 1296 HEUR-Worm.Win32.Movie666.exe 3100 HEUR-Worm.Win32.Movie666.exe 3100 HEUR-Worm.Win32.Movie666.exe 2256 HEUR-Worm.Win32.Movie666.exe 2256 HEUR-Worm.Win32.Movie666.exe 2544 HEUR-Worm.Win32.Movie666.exe 2544 HEUR-Worm.Win32.Movie666.exe 5052 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 1668 HEUR-Worm.Win32.Movie666.exe 5052 HEUR-Worm.Win32.Movie666.exe 4764 HEUR-Worm.Win32.Movie666.exe 4764 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 4720 HEUR-Worm.Win32.Movie666.exe 1100 HEUR-Worm.Win32.Movie666.exe 1100 HEUR-Worm.Win32.Movie666.exe 4060 HEUR-Worm.Win32.Movie666.exe 4060 HEUR-Worm.Win32.Movie666.exe 216 HEUR-Worm.Win32.Movie666.exe 1388 HEUR-Worm.Win32.Movie666.exe 216 HEUR-Worm.Win32.Movie666.exe 1388 HEUR-Worm.Win32.Movie666.exe 4340 HEUR-Worm.Win32.Movie666.exe 4340 HEUR-Worm.Win32.Movie666.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5044 wrote to memory of 1448 5044 HEUR-Worm.Win32.Movie666.exe 93 PID 5044 wrote to memory of 1448 5044 HEUR-Worm.Win32.Movie666.exe 93 PID 5044 wrote to memory of 1448 5044 HEUR-Worm.Win32.Movie666.exe 93 PID 5044 wrote to memory of 1668 5044 HEUR-Worm.Win32.Movie666.exe 94 PID 5044 wrote to memory of 1668 5044 HEUR-Worm.Win32.Movie666.exe 94 PID 5044 wrote to memory of 1668 5044 HEUR-Worm.Win32.Movie666.exe 94 PID 1448 wrote to memory of 4720 1448 HEUR-Worm.Win32.Movie666.exe 95 PID 1448 wrote to memory of 4720 1448 HEUR-Worm.Win32.Movie666.exe 95 PID 1448 wrote to memory of 4720 1448 HEUR-Worm.Win32.Movie666.exe 95 PID 1448 wrote to memory of 4764 1448 HEUR-Worm.Win32.Movie666.exe 98 PID 1448 wrote to memory of 4764 1448 HEUR-Worm.Win32.Movie666.exe 98 PID 1448 wrote to memory of 4764 1448 HEUR-Worm.Win32.Movie666.exe 98 PID 5044 wrote to memory of 5052 5044 HEUR-Worm.Win32.Movie666.exe 99 PID 5044 wrote to memory of 5052 5044 HEUR-Worm.Win32.Movie666.exe 99 PID 5044 wrote to memory of 5052 5044 HEUR-Worm.Win32.Movie666.exe 99 PID 1668 wrote to memory of 1388 1668 HEUR-Worm.Win32.Movie666.exe 100 PID 1668 wrote to memory of 1388 1668 HEUR-Worm.Win32.Movie666.exe 100 PID 1668 wrote to memory of 1388 1668 HEUR-Worm.Win32.Movie666.exe 100 PID 4720 wrote to memory of 216 4720 HEUR-Worm.Win32.Movie666.exe 101 PID 4720 wrote to memory of 216 4720 HEUR-Worm.Win32.Movie666.exe 101 PID 4720 wrote to memory of 216 4720 HEUR-Worm.Win32.Movie666.exe 101 PID 1448 wrote to memory of 3124 1448 HEUR-Worm.Win32.Movie666.exe 102 PID 1448 wrote to memory of 3124 1448 HEUR-Worm.Win32.Movie666.exe 102 PID 1448 wrote to memory of 3124 1448 HEUR-Worm.Win32.Movie666.exe 102 PID 5044 wrote to memory of 640 5044 HEUR-Worm.Win32.Movie666.exe 103 PID 5044 wrote to memory of 640 5044 HEUR-Worm.Win32.Movie666.exe 103 PID 5044 wrote to memory of 640 5044 HEUR-Worm.Win32.Movie666.exe 103 PID 4764 wrote to memory of 2544 4764 HEUR-Worm.Win32.Movie666.exe 106 PID 4764 wrote to memory of 2544 4764 HEUR-Worm.Win32.Movie666.exe 106 PID 4764 wrote to memory of 2544 4764 HEUR-Worm.Win32.Movie666.exe 106 PID 5052 wrote to memory of 1296 5052 HEUR-Worm.Win32.Movie666.exe 104 PID 5052 wrote to memory of 1296 5052 HEUR-Worm.Win32.Movie666.exe 104 PID 5052 wrote to memory of 1296 5052 HEUR-Worm.Win32.Movie666.exe 104 PID 1668 wrote to memory of 2256 1668 HEUR-Worm.Win32.Movie666.exe 105 PID 1668 wrote to memory of 2256 1668 HEUR-Worm.Win32.Movie666.exe 105 PID 1668 wrote to memory of 2256 1668 HEUR-Worm.Win32.Movie666.exe 105 PID 4720 wrote to memory of 3100 4720 HEUR-Worm.Win32.Movie666.exe 107 PID 4720 wrote to memory of 3100 4720 HEUR-Worm.Win32.Movie666.exe 107 PID 4720 wrote to memory of 3100 4720 HEUR-Worm.Win32.Movie666.exe 107 PID 216 wrote to memory of 1100 216 HEUR-Worm.Win32.Movie666.exe 109 PID 216 wrote to memory of 1100 216 HEUR-Worm.Win32.Movie666.exe 109 PID 216 wrote to memory of 1100 216 HEUR-Worm.Win32.Movie666.exe 109 PID 1388 wrote to memory of 4060 1388 HEUR-Worm.Win32.Movie666.exe 108 PID 1388 wrote to memory of 4060 1388 HEUR-Worm.Win32.Movie666.exe 108 PID 1388 wrote to memory of 4060 1388 HEUR-Worm.Win32.Movie666.exe 108 PID 3124 wrote to memory of 4340 3124 HEUR-Worm.Win32.Movie666.exe 110 PID 3124 wrote to memory of 4340 3124 HEUR-Worm.Win32.Movie666.exe 110 PID 3124 wrote to memory of 4340 3124 HEUR-Worm.Win32.Movie666.exe 110 PID 1448 wrote to memory of 3476 1448 HEUR-Worm.Win32.Movie666.exe 112 PID 1448 wrote to memory of 3476 1448 HEUR-Worm.Win32.Movie666.exe 112 PID 1448 wrote to memory of 3476 1448 HEUR-Worm.Win32.Movie666.exe 112 PID 5044 wrote to memory of 4556 5044 HEUR-Worm.Win32.Movie666.exe 111 PID 5044 wrote to memory of 4556 5044 HEUR-Worm.Win32.Movie666.exe 111 PID 5044 wrote to memory of 4556 5044 HEUR-Worm.Win32.Movie666.exe 111 PID 640 wrote to memory of 2004 640 HEUR-Worm.Win32.Movie666.exe 113 PID 640 wrote to memory of 2004 640 HEUR-Worm.Win32.Movie666.exe 113 PID 640 wrote to memory of 2004 640 HEUR-Worm.Win32.Movie666.exe 113 PID 4764 wrote to memory of 516 4764 HEUR-Worm.Win32.Movie666.exe 114 PID 4764 wrote to memory of 516 4764 HEUR-Worm.Win32.Movie666.exe 114 PID 4764 wrote to memory of 516 4764 HEUR-Worm.Win32.Movie666.exe 114 PID 4720 wrote to memory of 4908 4720 HEUR-Worm.Win32.Movie666.exe 117 PID 4720 wrote to memory of 4908 4720 HEUR-Worm.Win32.Movie666.exe 117 PID 4720 wrote to memory of 4908 4720 HEUR-Worm.Win32.Movie666.exe 117 PID 5052 wrote to memory of 852 5052 HEUR-Worm.Win32.Movie666.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:5892
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:8596
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"9⤵PID:17140
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"9⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:13060
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:8036
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:11308
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:15700
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:6472
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:11284
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:16700
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:18728
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:8420
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:14076
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:11512
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16880
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:4376
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:11920
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16468
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:12872
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:8568
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:15660
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:12016
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16608
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:12648
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:5992
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:8668
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:10788
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:15620
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7356
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16992
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11416
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16848
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:5156
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7972
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:14044
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11276
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16724
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6540
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13272
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8428
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:17092
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:18704
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12128
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:18672
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:10644
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:13508
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16256
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:5656
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11052
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16920
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:5172
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:8268
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:14084
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11184
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15992
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:528
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6640
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14036
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8984
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14392
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13044
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:17128
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:4908
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6108
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:8560
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16756
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:9740
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:10836
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15800
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13872
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7416
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15112
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12760
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8452
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16652
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:10956
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16644
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9976
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6692
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11884
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15792
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7816
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:9028
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16956
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:3384
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:11344
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16204
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:6124
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:8828
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:16948
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:2300
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:12076
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16372
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7444
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:15096
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16808
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:10728
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15636
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:18688
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:6772
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:14116
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:8912
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:15652
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14100
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6552
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11504
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16856
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:4276
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8612
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12208
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16636
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8276
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:9000
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16476
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:12880
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13124
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7728
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15684
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12744
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8356
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15580
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11852
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16212
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7352
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6684
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:14004
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:9036
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:13116
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:17104
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8592
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6256
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:9816
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13100
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7836
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16972
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:18712
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9824
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15588
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8292
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15104
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11784
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15612
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:18656
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6756
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:14092
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8936
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15384
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:13052
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:17068
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:4444
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5956
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11248
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15984
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15692
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:10636
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:14060
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6972
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15368
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13844
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8920
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:10452
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16812
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12120
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16380
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:14020
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:9352
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:11332
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:16732
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:4508
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:5984
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:8348
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:17020
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"8⤵PID:1344
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:11868
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:1104
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:9960
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7364
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16244
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:3388
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:10628
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14796
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7332
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:16596
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"7⤵PID:12884
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11100
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13876
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6484
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:13500
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8304
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15556
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11360
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:17008
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6028
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:9136
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:11352
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15572
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7340
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14068
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:18680
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11460
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15604
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8020
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16656
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:8224
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16740
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:564
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6612
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13140
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4992
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:11736
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16940
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:19044
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6080
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:12776
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:17000
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:3084
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16240
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12720
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16840
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13040
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5180
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8216
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11300
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:17200
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16748
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:18660
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12752
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16872
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12900
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:9144
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:14012
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12912
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:17112
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6200
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9152
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15668
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:12216
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4056
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6020
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:14808
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:20140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12728
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:18696
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8444
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12224
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16008
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:3944
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6528
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:14028
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:8928
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16964
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:10720
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8804
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:15596
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:9808
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15124
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7852
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:15072
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:10652
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15708
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:14108
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:8644
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:11912
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15644
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16580
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6520
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:10904
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9420
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:9044
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16932
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:13228
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6288
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9712
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:16676
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"6⤵PID:7900
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13148
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:7920
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4784
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:11092
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:16028
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:13884
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:7904
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15064
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:11036
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:15808
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6764
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:15056
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:8604
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:10912
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:15716
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:6340
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:9160
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:13108
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:17120
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:4472
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:7864
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15048
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12768
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16864
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:18896
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"5⤵PID:15564
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:12736
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6700
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:14052
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:8712
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:15628
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:19256
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:12032
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:16620
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:4556
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6116
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:9340
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:11108
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:13996
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:7468
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:16628
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:9832
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:15380
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:8904
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"4⤵PID:15676
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:12084
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:15832
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:6000
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:6964
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:15408
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:8884
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"3⤵PID:13216
-
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:12024
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:16460
-
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Worm.Win32.Movie666.exe"2⤵PID:6072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\malaysia lingerie girls nipples mistress (Sylvia).zip.exe
Filesize833KB
MD56ab2c0e6d72a2163aad5117a2f4fd75f
SHA1af6f2ea4626bcdb560ea55c3a4b6bd0384ba4c83
SHA256f23df4618dd8ba5d9d32f3bc6b87968af32a1cd397b03b65bce9be347f3b4e19
SHA51267728182bb77539362e6f7f921cad7d9d5f6e12803fa0a7934956511e301f86dbf3909a02e73226b67d0af8ed9c9c487165ffd62ed54e9ddacf105d870a9d24f