Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 20:38 UTC
Behavioral task
behavioral1
Sample
7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe
Resource
win10v2004-20240226-en
General
-
Target
7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe
-
Size
562KB
-
MD5
01c56a088665a63d15824c83e5f0aa54
-
SHA1
7043feaaf306a0dc30f3348fa3f2ac8b7674629b
-
SHA256
7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574
-
SHA512
1bff46602e084274c53fb268e64076f65273e130c24a5c9aef608d0870c428559ab984241fc13d53d276bf9a61713eadd55690d62550ac4a9ec72d5230567220
-
SSDEEP
12288:tEQoS9qhc5DcJ5Cj5Nb2wslDYwLRbmUmwwm5rqXSSl:t2c5gJ5MpTjQbnAmcXSSl
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral1/memory/2568-67-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2572-91-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-93-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2572-105-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-106-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-110-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-113-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-116-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-121-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-124-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-127-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-130-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-133-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-136-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-139-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-142-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/1204-145-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/1204-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/files/0x00070000000160cc-5.dat UPX behavioral1/memory/2568-67-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/2572-91-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-93-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/2572-105-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-106-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-110-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-113-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-116-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-121-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-124-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-127-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-130-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-133-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-136-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-139-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-142-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral1/memory/1204-145-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1204-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/files/0x00070000000160cc-5.dat upx behavioral1/memory/2568-67-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2572-91-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-93-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/2572-105-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-106-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-110-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-113-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-116-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-121-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-124-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-127-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-130-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-133-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-136-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-139-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-142-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral1/memory/1204-145-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\L: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\N: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\T: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\V: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\X: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\B: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\H: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\J: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\P: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\Y: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\U: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\W: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\A: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\E: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\G: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\O: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\Q: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\R: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\K: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\M: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\S: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File opened (read-only) \??\Z: 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\indian nude several models mistress .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\FxsTmp\spanish action hot (!) .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\config\systemprofile\asian horse public young .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\beastiality sleeping boobs .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\FxsTmp\german porn horse lesbian mature .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\norwegian cum beastiality [free] blondie .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\config\systemprofile\british cum hot (!) .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\System32\DriverStore\Temp\danish handjob handjob girls boobs (Kathrin).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\IME\shared\horse lingerie masturbation ejaculation .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SysWOW64\IME\shared\malaysia bukkake uncut girly .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Shared Gadgets\german hardcore fucking big shower .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Common Files\microsoft shared\horse fetish public .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Google\Temp\trambling masturbation shoes (Anniston).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Google\Update\Download\chinese fetish lesbian glans .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\norwegian action fucking masturbation (Tatjana).rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Office\Templates\norwegian hardcore lesbian redhair .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files\Common Files\Microsoft Shared\canadian action catfight .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files\Windows Journal\Templates\german gang bang uncut girly .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\trambling [bangbus] (Samantha).zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\malaysia beastiality [free] cock hairy (Gina,Samantha).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files\DVD Maker\Shared\asian horse cumshot several models .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\tyrkish beastiality beastiality hidden .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\fetish lesbian .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\american beastiality several models titts .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\horse catfight .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\norwegian porn [free] sweet (Curtney,Sandy).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\mssrv.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\GAC_32\Microsoft.SharePoint.BusinessData.Administration.Client\japanese horse xxx hot (!) penetration .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\asian lingerie bukkake voyeur gorgeoushorny .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_99b74194b7347cab\german kicking hardcore hot (!) gorgeoushorny .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\cum gang bang full movie hairy .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_1412267f4b3bb985\lesbian fucking [free] .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_6.1.7600.16385_none_6b16fa9f975e1109\black cumshot action sleeping 50+ (Britney,Janette).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_965db382b6fef5cb\canadian kicking sperm lesbian vagina sweet (Samantha,Sonja).zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\canadian kicking [bangbus] .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\GAC_MSIL\Microsoft.SharePoint.BusinessData.Administration.Client.Intl\canadian beastiality handjob hot (!) .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\tmp\french cum lingerie several models sweet .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\beast porn masturbation pregnant .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\handjob hidden ash .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_6.1.7600.16385_none_2958d4a31d2ec64f\indian sperm fucking catfight boobs balls .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_6.1.7600.16385_none_f27c4f066f5c6701\fucking girls stockings .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\chinese nude bukkake hot (!) fishy (Kathrin).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\french bukkake masturbation (Britney,Kathrin).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\spanish beast lesbian hot (!) .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_2e7f079c3208e549\malaysia animal fucking girls .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_6.1.7600.16385_none_3d98a610fed70b75\gang bang horse hot (!) vagina ash .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\Temporary Internet Files\british beast beast [bangbus] .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_8c6fc5a7aa8c435d\british hardcore beastiality licking .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_es-es_00bfb7e81e458178\kicking uncut YEâPSè& .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\horse porn full movie (Anniston).rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\cum big cock ìï (Ashley).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Temporary ASP.NET Files\italian bukkake public blondie .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_65b23d3c3a97bfaf\canadian lesbian sleeping ash .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_0835101f2d90c7b6\black action lingerie catfight YEâPSè& .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\fucking bukkake [milf] legs .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\beast [bangbus] swallow .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_bcc167434bb9b3ea\french nude sperm lesbian glans (Curtney).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\kicking uncut ash .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\gay hot (!) .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\security\templates\chinese gay lesbian 50+ .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_3c93ac15fd731acf\black nude cum lesbian (Kathrin,Kathrin).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\gay [bangbus] mature .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_9498b282333b64ec\russian fetish [free] shower .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\InstallTemp\asian cumshot [milf] boobs fishy .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\tyrkish nude animal [bangbus] redhair .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\malaysia lingerie trambling girls .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE56E.tmp\gay action big (Jade,Samantha).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_en-us_5d9f7d70ed4643fd\beast bukkake girls nipples .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_de-de_05ea1d9b8e2bf020\spanish beast kicking big glans fishy (Jade,Christine).rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_it-it_3b85bcbe4734e96a\fucking gay [milf] circumcision .rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\tyrkish sperm hidden (Sonja,Ashley).avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\italian hardcore hardcore licking .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\malaysia beast public ejaculation .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\chinese lingerie hidden feet hotel .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_6.1.7600.16385_none_8419660d1cc97b24\chinese gay big 50+ .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\lesbian nude sleeping bondage .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\asian horse [milf] vagina .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_664dbffec8693dfe\tyrkish sperm several models fishy .avi.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\japanese horse xxx several models .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\spanish fucking horse big hole latex (Christine,Samantha).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\SoftwareDistribution\Download\hardcore [free] .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\tyrkish gay horse catfight (Britney).zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_4fe2107fd06efdd8\spanish animal fetish hidden (Sonja).mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\cumshot [milf] balls .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0993a1b8823a4e79\british beast masturbation vagina bondage .zip.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\fucking trambling hot (!) balls .mpeg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_es-es_5d6ada54ed6d35a2\swedish cumshot voyeur hole latex (Liz,Britney).rar.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_es-es_8bc7919d3f36cee7\malaysia porn public .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe File created C:\Windows\winsxs\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_6.1.7600.16385_none_a727eb798dcfb185\japanese fetish big titts .mpg.exe 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 2572 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2568 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 28 PID 1204 wrote to memory of 2568 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 28 PID 1204 wrote to memory of 2568 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 28 PID 1204 wrote to memory of 2568 1204 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 28 PID 2568 wrote to memory of 2572 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 29 PID 2568 wrote to memory of 2572 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 29 PID 2568 wrote to memory of 2572 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 29 PID 2568 wrote to memory of 2572 2568 7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"C:\Users\Admin\AppData\Local\Temp\7604093da0828998bd7382321a68ab12f348b93543113e48c1b36d9304a1b574.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
Network
-
Remote address:8.8.8.8:53Request80.53.128.133.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request79.249.111.67.in-addr.arpaIN PTRResponse79.249.111.67.in-addr.arpaIN PTRwisedu
-
Remote address:8.8.8.8:53Request79.249.111.67.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request138.22.211.41.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request118.102.160.55.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request154.46.210.202.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request80.151.163.173.in-addr.arpaIN PTRResponse80.151.163.173.in-addr.arpaIN PTR173-163-151-80-cpennsylvania2hfccomcastbusinessnet
-
Remote address:8.8.8.8:53Request51.233.191.49.in-addr.arpaIN PTRResponse51.233.191.49.in-addr.arpaIN PTRn49-191-233-51mrk1qldoptusnetcomau
-
Remote address:8.8.8.8:53Request21.153.67.143.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.70.130.98.in-addr.arpaIN PTRResponse237.70.130.98.in-addr.arpaIN PTRec2-98-130-70-237 ap-south-2compute amazonawscom
-
Remote address:8.8.8.8:53Request5.3.223.68.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request24.251.3.230.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request90.220.34.45.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.185.102.246.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request112.91.93.79.in-addr.arpaIN PTRResponse112.91.93.79.in-addr.arpaIN PTR112919379revsfrnet
-
Remote address:8.8.8.8:53Request112.91.93.79.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request209.162.96.111.in-addr.arpaIN PTRResponse209.162.96.111.in-addr.arpaIN PTRKD111096162209ppp-bbdionnejp
-
Remote address:8.8.8.8:53Request86.155.37.230.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request164.24.168.54.in-addr.arpaIN PTRResponse164.24.168.54.in-addr.arpaIN PTRec2-54-168-24-164ap-northeast-1compute amazonawscom
-
Remote address:8.8.8.8:53Request42.143.9.114.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request32.116.183.59.in-addr.arpaIN PTRResponse32.116.183.59.in-addr.arpaIN PTRtriband-mum-5918311632mtnlnetin
-
Remote address:8.8.8.8:53Request32.116.183.59.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request55.180.158.214.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.118.74.60.in-addr.arpaIN PTRResponse8.118.74.60.in-addr.arpaIN PTRsoftbank060074118008bbtecnet
-
Remote address:8.8.8.8:53Request215.62.28.222.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request159.161.225.89.in-addr.arpaIN PTRResponse159.161.225.89.in-addr.arpaIN PTR15916122589revsfrnet
-
Remote address:8.8.8.8:53Request72.70.16.226.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request125.4.234.45.in-addr.arpaIN PTRResponse125.4.234.45.in-addr.arpaIN PTR45-234-4-125dynprovedorfibernetcombr
-
Remote address:8.8.8.8:53Request39.119.38.96.in-addr.arpaIN PTRResponse39.119.38.96.in-addr.arpaIN PTR096-038-119-039resspectrumcom
-
Remote address:8.8.8.8:53Request172.9.80.194.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.9.80.194.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request121.117.253.216.in-addr.arpaIN PTRResponse
-
72 B 121 B 1 1
DNS Request
80.53.128.133.in-addr.arpa
-
144 B 93 B 2 1
DNS Request
79.249.111.67.in-addr.arpa
DNS Request
79.249.111.67.in-addr.arpa
-
72 B 133 B 1 1
DNS Request
138.22.211.41.in-addr.arpa
-
73 B 148 B 1 1
DNS Request
118.102.160.55.in-addr.arpa
-
73 B 122 B 1 1
DNS Request
154.46.210.202.in-addr.arpa
-
73 B 140 B 1 1
DNS Request
80.151.163.173.in-addr.arpa
-
72 B 125 B 1 1
DNS Request
51.233.191.49.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
21.153.67.143.in-addr.arpa
-
72 B 136 B 1 1
DNS Request
237.70.130.98.in-addr.arpa
-
69 B 69 B 1 1
DNS Request
5.3.223.68.in-addr.arpa
-
71 B 128 B 1 1
DNS Request
24.251.3.230.in-addr.arpa
-
71 B 71 B 1 1
DNS Request
90.220.34.45.in-addr.arpa
-
74 B 142 B 1 1
DNS Request
171.185.102.246.in-addr.arpa
-
142 B 109 B 2 1
DNS Request
112.91.93.79.in-addr.arpa
DNS Request
112.91.93.79.in-addr.arpa
-
73 B 119 B 1 1
DNS Request
209.162.96.111.in-addr.arpa
-
72 B 129 B 1 1
DNS Request
86.155.37.230.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
164.24.168.54.in-addr.arpa
-
71 B 71 B 1 1
DNS Request
42.143.9.114.in-addr.arpa
-
144 B 123 B 2 1
DNS Request
32.116.183.59.in-addr.arpa
DNS Request
32.116.183.59.in-addr.arpa
-
73 B 168 B 1 1
DNS Request
55.180.158.214.in-addr.arpa
-
70 B 114 B 1 1
DNS Request
8.118.74.60.in-addr.arpa
-
72 B 133 B 1 1
DNS Request
215.62.28.222.in-addr.arpa
-
73 B 113 B 1 1
DNS Request
159.161.225.89.in-addr.arpa
-
71 B 128 B 1 1
DNS Request
72.70.16.226.in-addr.arpa
-
71 B 125 B 1 1
DNS Request
125.4.234.45.in-addr.arpa
-
71 B 117 B 1 1
DNS Request
39.119.38.96.in-addr.arpa
-
142 B 128 B 2 1
DNS Request
172.9.80.194.in-addr.arpa
DNS Request
172.9.80.194.in-addr.arpa
-
74 B 142 B 1 1
DNS Request
121.117.253.216.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD572921ff6517d669c341b05ff0813f97b
SHA1fc333b1912658838c1d6cfe73ac86856235c5ef1
SHA256abc4ccde654940189911c35dac5db30c54b9fd88397db5d28bddf86561201b04
SHA512497f2a750c44fb6c90d610678b5fd97a34934bbe519c9a902f425b399ad59044a31ac19225d0c74ff402cedbb44dc3aa351decc94ae7a02c5c27dd7e5c2bcc14