Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 18:15
Static task
static1
Behavioral task
behavioral1
Sample
0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe
Resource
win10v2004-20240226-en
General
-
Target
0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe
-
Size
1.8MB
-
MD5
c6179e99bad990a7635804bdea29785c
-
SHA1
b9ace4df614fe203c1f3096875cbf40c652508d6
-
SHA256
0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c
-
SHA512
33d2ea47f49b3b42e540fad0728b6bf3fc11b6182b9e935c6f7b14bb5be662cdeef834304086dc059f266ea9b39a648de7271aaebd948ca392c99e5c2ca11f59
-
SSDEEP
49152:0hWkgKKcqohBZltJkecvnkiLEY+Z3OxxqJmxH7Sa7rqTm:0YXKRFltJk9vki9+MTqJm7qS
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 21 IoCs
resource yara_rule behavioral2/memory/1728-15-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1572-32-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1784-39-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-156-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1728-170-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1572-186-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1784-187-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-188-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-189-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-193-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-206-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-210-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-215-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-221-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-231-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-235-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-239-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-243-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-248-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-252-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4744-256-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 23 IoCs
resource yara_rule behavioral2/memory/4744-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/files/0x0007000000023219-5.dat UPX behavioral2/memory/1728-15-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1572-32-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1784-39-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-156-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1728-170-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1572-186-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/1784-187-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-188-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-189-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-193-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-206-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-210-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-215-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-221-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-231-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-235-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-239-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-243-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-248-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-252-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4744-256-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\J: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\L: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\O: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\V: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\B: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\G: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\N: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\Q: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\R: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\S: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\T: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\U: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\E: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\H: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\W: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\Y: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\X: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\M: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\P: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\Z: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\A: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File opened (read-only) \??\K: 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\fucking public cock .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lingerie voyeur .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\beast [free] femdom .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\bukkake [milf] 50+ .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\config\systemprofile\bukkake [milf] glans YEâPSè& .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\System32\DriverStore\Temp\german lesbian girls cock latex (Sarah).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\config\systemprofile\russian handjob sperm uncut 40+ .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\FxsTmp\danish handjob beast [milf] wifey .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\IME\SHARED\horse lesbian 40+ .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\russian cum sperm catfight mature (Sonja,Karin).zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\FxsTmp\chinese beast [free] .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\danish cum xxx full movie .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\italian fetish beast voyeur hole .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\tyrkish porn hardcore full movie feet .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\brasilian horse hardcore [bangbus] .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\russian fetish bukkake several models glans (Sonja,Sylvia).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Microsoft\Temp\lingerie [milf] swallow .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\root\Templates\fucking girls glans fishy .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\hardcore [free] pregnant (Britney,Tatjana).zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\sperm girls .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\american porn lingerie big feet hotel .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\handjob blowjob [milf] ejaculation .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Google\Temp\brasilian cum bukkake lesbian cock (Christine,Samantha).rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Common Files\microsoft shared\bukkake [free] .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\sperm [bangbus] titts 40+ (Jade).zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\sperm public shoes .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\Updates\Download\indian beastiality beast catfight .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\brasilian gang bang xxx [milf] (Samantha).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Google\Update\Download\brasilian horse lingerie girls hole .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\hardcore [bangbus] .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Program Files (x86)\Microsoft\Temp\EU5927.tmp\japanese fetish xxx several models swallow .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\brasilian kicking fucking catfight .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\trambling full movie (Janette).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_e79b400a6df5fd2c\canadian fucking several models hole .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\tyrkish kicking horse full movie glans lady (Liz).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\bukkake masturbation femdom (Anniston,Curtney).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\african bukkake [free] sweet .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\black fetish xxx lesbian \Û .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\russian gang bang bukkake uncut .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\british hardcore catfight YEâPSè& .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\tyrkish beastiality beast lesbian feet mistress .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\fetish horse hot (!) .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\japanese horse horse girls titts hotel (Tatjana).rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\french fucking full movie glans Ôï (Tatjana).rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\malaysia lingerie uncut glans .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\italian animal blowjob [milf] .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\spanish lesbian full movie titts swallow (Janette).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_fd7349c396c417ae\norwegian gay catfight .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\german lesbian girls .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\blowjob big (Sylvia).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\action lesbian big (Jade).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\blowjob [milf] .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_551afa5edf8be30e\fetish lingerie voyeur titts redhair (Sylvia).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\hardcore public cock young .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\russian action fucking licking fishy .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\german beast hidden feet .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_07787dd7ae0cf4f6\norwegian bukkake [milf] cock upskirt (Samantha).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\hardcore lesbian .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\chinese hardcore catfight glans 50+ .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\bukkake hidden shoes .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\sperm hot (!) pregnant .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_d9e58b774d1b6e80\horse public hole sm .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_a23e6a858fad9595\american animal fucking catfight feet (Britney,Janette).mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\asian lesbian hidden boots .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\asian hardcore public young .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\hardcore hidden titts .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\brasilian action lesbian sleeping .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.746_none_b53f8b98f2b3a373\norwegian fucking [milf] cock circumcision .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\gay sleeping balls (Christine,Karin).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\lesbian catfight titts (Kathrin,Karin).mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\american action gay hot (!) cock .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\american kicking gay hot (!) shower .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\action blowjob several models redhair (Kathrin,Curtney).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\kicking lingerie hidden black hairunshaved .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\brasilian nude hardcore sleeping (Melissa).zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_it-it_f1a0741e853eda74\gang bang sperm full movie hole .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_2426cc56d654beaa\swedish beastiality gay sleeping titts .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\american fetish sperm several models .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\malaysia hardcore voyeur hotel .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\malaysia fucking big granny .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\swedish nude horse [bangbus] feet ash (Melissa).mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\tyrkish fetish lingerie licking .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\russian handjob bukkake hot (!) .mpeg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\blowjob girls cock bondage .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\malaysia fucking big hole 50+ .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\french xxx uncut hairy .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_8fafa997b9980bea\porn beast voyeur lady .avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\japanese handjob gay hidden hairy (Sandy,Jade).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\cum xxx big .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_5abbd3c4a3f2014c\african blowjob big cock YEâPSè& (Karin).zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\xxx [bangbus] (Melissa).avi.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\Temp\gang bang blowjob hidden cock young .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\canadian hardcore hidden .rar.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\PLA\Templates\indian porn trambling voyeur cock .zip.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\xxx public shower .mpg.exe 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1784 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 1572 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4744 wrote to memory of 1728 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 88 PID 4744 wrote to memory of 1728 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 88 PID 4744 wrote to memory of 1728 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 88 PID 4744 wrote to memory of 1572 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 92 PID 4744 wrote to memory of 1572 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 92 PID 4744 wrote to memory of 1572 4744 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 92 PID 1728 wrote to memory of 1784 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 93 PID 1728 wrote to memory of 1784 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 93 PID 1728 wrote to memory of 1784 1728 0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"C:\Users\Admin\AppData\Local\Temp\0472e7be92a21f776e727cb6bad8188e7525fd2481cec95f0d4fca6ed939b61c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\brasilian gang bang xxx [milf] (Samantha).avi.exe
Filesize843KB
MD55e6768477f1541558525a85a43c54c63
SHA13b7bfa44e935f99df792a94d23a14633dcb84687
SHA2567480516b45e7180e90943216dde9f6cdfeaa3b8f3fbdb0e543e3d9fae0679a2c
SHA5122917f48aa62c23a6a59f5e3704f926a49015fb06459d70b39718587339346641dfb0db7c670a39d6bc8c16e73180582b0d191138fb1c57917aea9fa0982ba26d