Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe
Resource
win10v2004-20240319-en
General
-
Target
b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe
-
Size
670KB
-
MD5
15861d1278c16eeaefc7829c95067ff7
-
SHA1
02b98a26753da7e5886bce1048875c085b8b970f
-
SHA256
b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7
-
SHA512
001d09b08de15f9bdbfebd6a515cdff50c7068bd6420095de91877000dac1cdfd95e11f0a2a68a2a60231cdb6465bf582efa10517632308d0036ca00897521b9
-
SSDEEP
12288:lXa8smf49kRMcBrNF6xVfs35BssQPx8Pq6UTdUV1eetulMsN/h:lq8zRMcrUlkMFPx8YimQulMsFh
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/2492-149-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3180-169-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-189-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-190-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4576-191-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/524-192-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-196-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-199-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-202-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-207-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-215-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-229-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-231-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-237-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-242-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-246-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2492-249-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral2/memory/2492-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/files/0x0007000000023348-5.dat UPX behavioral2/memory/2492-149-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/3180-169-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-189-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-190-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/4576-191-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/524-192-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-196-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-199-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-202-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-207-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-215-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-229-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-231-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-237-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-242-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-246-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral2/memory/2492-249-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe Key value queried \REGISTRY\USER\S-1-5-21-817259280-2658881748-983986378-1000\Control Panel\International\Geo\Nation b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\X: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\Z: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\H: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\B: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\G: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\N: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\O: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\S: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\A: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\I: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\L: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\M: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\Q: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\T: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\V: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\W: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\E: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\Y: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\P: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\R: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\U: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File opened (read-only) \??\J: b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\danish cumshot fucking voyeur (Janette).rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\hardcore masturbation cock young (Liz).mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\tyrkish cum lingerie [free] feet shoes .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\FxsTmp\russian handjob horse sleeping girly .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish porn lingerie [milf] girly .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black porn xxx lesbian hairy (Christine,Jade).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\config\systemprofile\tyrkish cum hardcore public upskirt (Christine,Janette).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\System32\DriverStore\Temp\xxx lesbian beautyfull .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\FxsTmp\trambling [milf] titts bedroom .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish horse bukkake hot (!) .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\config\systemprofile\fucking [bangbus] ¼ë .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SysWOW64\IME\SHARED\black animal blowjob lesbian swallow (Britney,Sarah).mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\danish horse lingerie catfight (Jade).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\lesbian [free] hole .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Common Files\microsoft shared\sperm [milf] granny (Sonja,Sarah).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\dotnet\shared\bukkake licking feet sweet .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\italian handjob blowjob [bangbus] cock (Sandy,Karin).mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\Updates\Download\gay girls balls .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\hardcore public hole balls .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\black kicking bukkake full movie hole .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\root\Templates\swedish beastiality trambling sleeping glans 50+ .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese action trambling big (Jade).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\trambling hot (!) cock (Jenna,Karin).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\danish fetish lesbian licking titts latex (Curtney).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\danish beastiality beast big titts .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{D3EA2F86-0081-495C-8439-1E64CA71F999}\EDGEMITMP_57EE5.tmp\lingerie big hole shower .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\lesbian hidden glans .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Google\Update\Download\fucking voyeur glans (Kathrin,Sarah).rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Microsoft\Temp\russian fetish fucking public titts mature .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\malaysia trambling [milf] latex .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Program Files (x86)\Google\Temp\fucking big (Janette).mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\french xxx masturbation feet mistress (Sarah).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_es-es_e5c3ad79c4e34ebb\tyrkish kicking bukkake uncut hole bedroom .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\handjob bukkake masturbation hole redhair (Samantha).rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\african trambling sleeping .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\beastiality lingerie catfight cock YEâPSè& .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\malaysia gay girls .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\action horse [bangbus] femdom .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\handjob lesbian catfight glans .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\gay sleeping shoes .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\japanese action lingerie catfight .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\russian kicking blowjob [milf] (Melissa).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\fetish blowjob big hole .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\trambling lesbian (Melissa).mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\indian handjob xxx hot (!) feet ejaculation .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\action blowjob hidden .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\japanese animal beast full movie beautyfull .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\porn horse girls feet girly (Karin).mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.746_none_e2c6a972a81b8d2c\black cum trambling licking glans bondage (Liz).mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_c9ce604ef4cbf323\asian lingerie big (Jade).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\animal xxx hot (!) titts .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\african gay [bangbus] sweet .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\x86_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_bde408a455fc3ece\blowjob hot (!) cock lady .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\chinese sperm lesbian beautyfull .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\norwegian horse uncut .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\german blowjob catfight .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\tyrkish porn lingerie hidden hole castration .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\malaysia trambling [milf] feet granny (Karin).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\brasilian kicking hardcore hot (!) hole (Christine,Janette).mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\lingerie several models glans upskirt (Karin).mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\malaysia beast sleeping titts .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\mssrv.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\italian gang bang lingerie [milf] bondage (Anniston,Tatjana).zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\SoftwareDistribution\Download\brasilian cumshot hardcore licking hole traffic .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\indian gang bang beast [free] mistress .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\german horse [milf] 50+ .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_a4f93129c473df49\trambling [free] glans .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\Downloaded Program Files\russian beastiality sperm uncut titts bondage (Karin).rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\norwegian trambling girls .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\animal gay hidden titts .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\trambling catfight blondie .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_f962ab5f47e1e896\blowjob [milf] .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\german sperm [milf] swallow .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\nude sperm girls titts redhair (Tatjana).rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\italian beastiality fucking licking .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\african bukkake sleeping traffic .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\japanese beastiality beast lesbian stockings .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\spanish blowjob uncut titts .rar.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\danish horse beast [milf] .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\swedish nude gay [bangbus] hole latex .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\bukkake [milf] ash .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\italian action blowjob sleeping ash .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\british bukkake girls castration .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\sperm lesbian lady .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\indian gang bang fucking [bangbus] titts .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_e2f5ebbcec2d8fca\gay lesbian lady .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\trambling hidden .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\french bukkake [milf] .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\malaysia xxx public fishy .zip.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\horse masturbation hole upskirt .mpg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\french fucking licking feet .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\fucking several models glans sm (Liz).avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\russian animal fucking licking glans .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_b597a55b603b537d\italian animal trambling [free] .avi.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\malaysia lingerie several models cock Ôï .mpeg.exe b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 524 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 4576 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2492 wrote to memory of 3180 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 98 PID 2492 wrote to memory of 3180 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 98 PID 2492 wrote to memory of 3180 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 98 PID 2492 wrote to memory of 4576 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 100 PID 2492 wrote to memory of 4576 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 100 PID 2492 wrote to memory of 4576 2492 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 100 PID 3180 wrote to memory of 524 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 102 PID 3180 wrote to memory of 524 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 102 PID 3180 wrote to memory of 524 3180 b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:524
-
-
-
C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"C:\Users\Admin\AppData\Local\Temp\b80bda13861a240dce8695573fe38a5ede6319e6c96a8b52e9d1d54552edcaf7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4084 --field-trial-handle=2244,i,11986678581565715302,451159359636456336,262144 --variations-seed-version /prefetch:81⤵PID:4560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese action trambling big (Jade).zip.exe
Filesize2.0MB
MD5694bf15fee7758b45a37625541640938
SHA1236b5bf8d3ee4d513787cdada2d768c970c7fb59
SHA25668bba73e2821622d14ed717f69ce466d8d4090e65b5f5afc247b8399f237b283
SHA512855a41b15bb3f0d8a4782f40cf3d46e789f109be6e98cb9bca6f6b15abbb3ef234b82ebe44fa24a4e5a090b7a973261486ff77f8506ea0d8cff40ee8afe19066