Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2024, 19:03
Behavioral task
behavioral1
Sample
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe
Resource
win10v2004-20240226-en
General
-
Target
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe
-
Size
1.9MB
-
MD5
343b82727f88c565ddccac5af663cc75
-
SHA1
e6c76a20b7f76d71e9e1783e73fc662355eebb58
-
SHA256
1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827
-
SHA512
4fc88637dd7a86cf9af23b4153bb9e63b5adda94e780e957e6cc818fa14bac76d29534a9ca35bfecf97f61dedf971bfdebdcfbece3713a9329623fd743d0494d
-
SSDEEP
49152:QJS/J8v3KO4f5knRzRoIIC+X0stNUBTILh0k4+umR/:QJSSv3KOy5YRnzi0stNUBULa0u+/
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 19 IoCs
resource yara_rule behavioral2/memory/1168-11-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3088-35-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-121-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1168-151-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3088-152-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3804-153-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-154-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-164-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-180-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-202-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-206-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-210-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-215-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-219-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-227-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-231-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-237-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-247-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4988-251-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x000700000002333c-5.dat UPX behavioral2/memory/1168-11-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3088-35-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-121-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1168-151-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3088-152-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3804-153-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-154-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-164-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-180-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-202-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-206-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-210-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-215-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-219-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-227-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-231-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-237-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-247-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/4988-251-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4988-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x000700000002333c-5.dat upx behavioral2/memory/1168-11-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3088-35-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-121-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1168-151-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3088-152-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3804-153-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-154-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-164-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-180-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-202-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-206-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-210-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-215-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-219-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-227-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-231-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-237-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-247-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4988-251-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\E: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\G: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\H: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\P: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\T: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\A: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\M: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\N: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\Q: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\S: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\W: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\X: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\Y: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\B: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\J: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\O: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\R: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\U: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\I: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\K: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\L: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File opened (read-only) \??\Z: 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\sperm gang bang girls hotel .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\british cum full movie 40+ (Tatjana,Anniston).mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\japanese trambling hardcore masturbation sweet .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish trambling lesbian castration (Samantha).mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\FxsTmp\asian cum lingerie licking traffic (Christine,Sonja).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\IME\SHARED\canadian lesbian beast several models feet leather .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\kicking xxx lesbian vagina leather (Janette).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\config\systemprofile\asian handjob masturbation titts .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\FxsTmp\canadian action lingerie hot (!) blondie .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\IME\SHARED\xxx gang bang several models feet bondage (Melissa,Anniston).mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lingerie lesbian ash penetration .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SysWOW64\config\systemprofile\brasilian lingerie voyeur .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\asian cumshot girls ash .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\swedish bukkake cumshot [free] bondage .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Google\Temp\american fucking blowjob [bangbus] balls .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{1FAC69E2-6A78-4418-8957-20DE7094BB95}\EDGEMITMP_86547.tmp\animal hardcore catfight bondage .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Microsoft\Temp\action action public fishy .rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\dotnet\shared\malaysia lesbian blowjob several models hole .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\german beast action several models pregnant (Ashley,Samantha).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Microsoft Office\Updates\Download\action sperm [free] .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\japanese horse catfight titts (Sandy).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Common Files\microsoft shared\sperm girls redhair .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish trambling voyeur ash .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\italian lesbian licking wifey .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\swedish lingerie masturbation swallow .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\russian horse public .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Google\Update\Download\fetish licking .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\african animal cum [milf] 40+ .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Microsoft Office\root\Templates\nude nude catfight .rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\spanish lingerie kicking masturbation (Sandy,Tatjana).mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\chinese lingerie kicking masturbation boobs mistress (Sandy,Melissa).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\action public titts circumcision (Gina,Karin).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\horse big mature (Sonja,Melissa).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\cumshot [milf] legs Œã .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\fetish beastiality licking vagina (Samantha,Christine).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\american kicking horse public vagina shower .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\lesbian [bangbus] .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\chinese porn masturbation ash (Anniston).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\handjob nude hot (!) .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\trambling [milf] hole femdom (Kathrin).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\canadian action [bangbus] ash 50+ .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\action cumshot licking legs .rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\malaysia hardcore [milf] (Anniston,Britney).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\norwegian fetish fetish sleeping (Britney,Samantha).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\horse hidden penetration .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\french gay several models gorgeoushorny .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\italian action licking ejaculation (Curtney).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\mssrv.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\InstallTemp\horse sleeping pregnant .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_d58d4747b1d5988c\american blowjob [milf] titts 50+ .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\horse lesbian blondie (Jade).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\animal [bangbus] black hairunshaved .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_4ab14109a3e1e067\canadian nude handjob hot (!) leather .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\lingerie porn voyeur .rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\fucking big (Jade,Kathrin).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\french lingerie lesbian redhair .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\handjob [bangbus] cock gorgeoushorny .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\brasilian porn full movie titts .rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\chinese blowjob full movie stockings .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\cum masturbation .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\spanish animal full movie .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\japanese xxx kicking several models sweet (Curtney,Jenna).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\russian beastiality porn hidden penetration .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\african gang bang beast licking .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\brasilian horse licking Ôï .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\nude gang bang masturbation pregnant (Janette).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\porn porn [free] sweet .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\danish hardcore catfight hotel .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\black bukkake uncut .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\PLA\Templates\gang bang gang bang girls glans upskirt (Anniston,Tatjana).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\action uncut blondie (Ashley).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\cumshot hot (!) boobs balls (Sandy).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\bukkake masturbation ejaculation (Anniston,Jenna).mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\black sperm xxx sleeping ash granny .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\gang bang gang bang lesbian .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\assembly\temp\danish action action [milf] stockings .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\kicking hardcore several models traffic .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\sperm catfight .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\asian gay porn girls .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\lingerie several models boots (Karin).rar.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\beast handjob hot (!) redhair .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\italian fucking [bangbus] penetration .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\black nude cum licking penetration .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\sperm gay hot (!) .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\black beastiality porn voyeur bedroom .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\tyrkish gang bang uncut shower (Anniston).avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\brasilian beast girls balls (Liz).mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\xxx hardcore licking .avi.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\asian animal sperm masturbation mistress .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\blowjob fucking girls sm .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\african porn fucking [free] bedroom .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\security\templates\fucking lesbian 50+ .mpeg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\canadian porn girls mistress .zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\spanish gay lesbian .mpg.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\sperm public lady (Ashley,Jade).zip.exe 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3804 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 3088 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1168 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 94 PID 4988 wrote to memory of 1168 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 94 PID 4988 wrote to memory of 1168 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 94 PID 4988 wrote to memory of 3088 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 95 PID 4988 wrote to memory of 3088 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 95 PID 4988 wrote to memory of 3088 4988 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 95 PID 1168 wrote to memory of 3804 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 96 PID 1168 wrote to memory of 3804 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 96 PID 1168 wrote to memory of 3804 1168 1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"C:\Users\Admin\AppData\Local\Temp\1953df40a750dbc5e981264ef67f593084c01a699f5feefeb00c379b59908827.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3848 --field-trial-handle=2256,i,6057863739127169200,6895476048812676039,262144 --variations-seed-version /prefetch:81⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\swedish trambling voyeur ash .avi.exe
Filesize1.4MB
MD516ff47dde7e82d6ff862c0f42b704cfd
SHA1bd56b02c6b8d7b0e3e64aec44829b8aa38d0a517
SHA2567f70e7162b7cb1427c8c14d0f19b6b829e5d4dcb810eea36e4dccac06c995528
SHA5125c51e3e4ccc461f741a812cd35a3540cc926dfec5c495a450bb7cdfe0fb931f6629abcfd245b9f8114329635e18701d2d09bfea0ade9fc373443f2e0fa18cf75