Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 02:51
Behavioral task
behavioral1
Sample
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe
Resource
win10v2004-20240226-en
General
-
Target
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe
-
Size
1.9MB
-
MD5
50bf48b00b3f2e40b197f9f935056573
-
SHA1
2330808a446738fc89eeae87d2b2470d7bc49d88
-
SHA256
e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46
-
SHA512
bfd8a19101fd3dfb3c83057e826be404c2ce9a2c170b08c864d5d4ff6ace2f7d91a3d372afd746c9deb7b4a935f86f54a3bf17fc2f7ec18baea99480ad97f925
-
SSDEEP
49152:pfe4sTDBq+J0eiGu/a2RhxUCXxveBZt5iKF+E8clIGR:pG4sxJtiS2fiJgKp8clIGR
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
resource yara_rule behavioral2/memory/5064-11-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4004-12-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-14-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/832-15-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-17-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3020-38-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-149-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-165-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-189-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-206-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-210-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-214-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-218-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-222-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-227-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-230-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-234-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/5064-239-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/5064-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000700000002327b-5.dat UPX behavioral2/memory/5064-11-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4004-12-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-14-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/832-15-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-17-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3020-38-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-149-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-165-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-189-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-206-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-210-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-214-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-218-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-222-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-227-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-230-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-234-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/5064-239-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/5064-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000700000002327b-5.dat upx behavioral2/memory/5064-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4004-12-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-14-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/832-15-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-17-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3020-38-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-149-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-165-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-234-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5064-239-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\S: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\B: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\H: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\I: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\N: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\Z: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\A: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\O: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\R: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\U: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\W: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\X: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\E: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\K: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\T: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\V: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\Q: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\Y: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\G: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\J: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\L: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File opened (read-only) \??\M: e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\french cum hidden cock .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\tyrkish sperm fucking hot (!) mature (Liz).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\FxsTmp\black action beast [milf] ash mistress .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\cum xxx [bangbus] titts .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\config\systemprofile\lingerie [free] .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\IME\SHARED\indian lingerie uncut glans .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black blowjob masturbation bondage .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\config\systemprofile\porn fetish masturbation .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\System32\DriverStore\Temp\tyrkish handjob porn several models titts sm .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\FxsTmp\horse uncut ash leather .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\norwegian bukkake licking .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\xxx [bangbus] shower (Ashley,Sylvia).zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\gang bang big .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Microsoft Office\Updates\Download\african porn porn public .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\hardcore lesbian .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\african sperm beastiality [free] nipples (Ashley,Christine).avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\dotnet\shared\spanish porn [milf] shoes .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Microsoft Office\root\Templates\swedish horse lingerie full movie mistress .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\porn bukkake uncut .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\danish gay several models vagina .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Google\Temp\spanish cumshot full movie .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Google\Update\Download\lingerie animal girls titts high heels .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\spanish sperm licking nipples 50+ .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Common Files\microsoft shared\nude several models (Britney,Tatjana).zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\animal several models feet stockings .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\horse several models boobs (Sandy,Sarah).mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\british animal voyeur ash .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\japanese lingerie uncut (Sylvia,Jenna).rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Microsoft\Temp\beastiality blowjob uncut bedroom (Jenna).mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\hardcore horse several models .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\sperm handjob voyeur .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\danish sperm sperm masturbation redhair .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\indian bukkake [milf] vagina .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_c494b3b28da10665\brasilian cum lesbian licking .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\trambling sperm sleeping .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\security\templates\spanish xxx cumshot several models vagina 50+ .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\black hardcore [bangbus] .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\spanish horse sleeping (Britney,Gina).avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\xxx handjob [bangbus] young .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\russian handjob full movie YEâPSè& .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_fe0807c37141be7a\french handjob beast [bangbus] .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\nude xxx hot (!) stockings (Sonja,Tatjana).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\german gay fucking public cock femdom .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\gay cum several models ash .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\japanese beast handjob several models traffic .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_es-es_8da1621e0a800290\italian nude lesbian legs penetration .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\horse gang bang masturbation .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\spanish hardcore catfight titts granny .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\russian cumshot girls latex (Sylvia).zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\british gay licking stockings .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\french sperm kicking public hairy .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.1_none_e32b64807ab11fd2\danish blowjob kicking masturbation glans gorgeoushorny (Janette,Gina).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_4756d423b091d10b\brasilian kicking several models .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\norwegian handjob masturbation .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\chinese porn cum several models (Jenna,Anniston).rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\black gay blowjob girls bondage (Sarah).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\chinese porn gang bang hot (!) cock gorgeoushorny .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\german trambling kicking licking bondage .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\spanish lingerie trambling several models glans circumcision .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\brasilian action sleeping upskirt .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\french nude catfight hole leather .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\japanese hardcore several models .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\spanish gay several models .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_it-it_72a319bf8ee74a9b\brasilian horse trambling big .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\beast beastiality big girly (Britney,Sylvia).rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.1_none_5a23b464e1e0b15e\sperm [bangbus] swallow .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\spanish fetish beastiality lesbian (Sylvia).rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\beastiality lesbian 40+ (Jade,Liz).rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\porn public upskirt .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\italian action animal girls swallow .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\action lesbian hot (!) (Tatjana).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\asian gay gang bang full movie girly .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\brasilian fetish hidden black hairunshaved .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\african animal trambling hidden high heels (Kathrin,Sonja).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\tyrkish nude catfight .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\gang bang voyeur (Sarah,Samantha).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\black cum catfight .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\xxx gay girls .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\norwegian kicking [bangbus] balls .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\nude uncut 40+ (Karin,Jade).mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\beast full movie boobs swallow (Curtney,Gina).zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\african cum masturbation legs black hairunshaved .mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\xxx xxx several models mistress (Kathrin,Janette).zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\animal bukkake [free] .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\horse hot (!) boobs (Gina).mpeg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\xxx handjob hidden gorgeoushorny .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\gay lingerie public vagina (Samantha).avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\british fetish horse [free] boobs .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\canadian trambling blowjob masturbation granny .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\malaysia blowjob cumshot [free] 40+ .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\black horse trambling hidden .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\asian nude public 40+ .rar.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\animal horse big .avi.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\asian handjob beast big .zip.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\gay lesbian several models hotel .mpg.exe e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 3020 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 4004 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5064 wrote to memory of 832 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 91 PID 5064 wrote to memory of 832 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 91 PID 5064 wrote to memory of 832 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 91 PID 5064 wrote to memory of 4004 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 92 PID 5064 wrote to memory of 4004 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 92 PID 5064 wrote to memory of 4004 5064 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 92 PID 832 wrote to memory of 3020 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 93 PID 832 wrote to memory of 3020 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 93 PID 832 wrote to memory of 3020 832 e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"C:\Users\Admin\AppData\Local\Temp\e1282f5274335294677f25ba7628570d81aa69f8519fe2248613b21133299c46.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4248 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\animal several models feet stockings .avi.exe
Filesize1.2MB
MD5a66273b6f2dcc162e25703ba567a647c
SHA1d0354b719c98ff818096fdcdecb1c09236842627
SHA256404f29254ea5bfc39996f2c2ed8e3331042281e752d906c08da61316b0f53ee6
SHA5122a7a7afeabda94dc19cd00131218f7c1b51afe649c46e3eabea08af77636b7f8a78bdd6e11d0fb1dbe27131ed7fa14d1c8288554e4ca889f6263f696663487cf