Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16/04/2024, 20:55 UTC
Behavioral task
behavioral1
Sample
38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe
Resource
win10v2004-20240412-en
General
-
Target
38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe
-
Size
982KB
-
MD5
a896caa1694acef52e877f3875bb9c75
-
SHA1
57eed3eee6332182bf6002500564fc45a386dcd3
-
SHA256
38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999
-
SHA512
5777b4cd2a749db39030c641187f2ee85b18ccee64db9ad9bb3fab360aa1cb4e3d5fcf255d5a40a60c6881fee7b2695e7022b9cc6504365c5070d5caf7570c4b
-
SSDEEP
24576:YofxqqsLJDqQUrmDB39PDA5HEL+T+7qSgrX+2tm9IFm:XfeBqQUrmDBV2EiT+Ws2m
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 6 IoCs
resource yara_rule behavioral2/memory/3420-70-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4656-163-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4464-191-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3420-194-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2900-195-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4656-197-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 9 IoCs
resource yara_rule behavioral2/memory/4464-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x0007000000023413-5.dat UPX behavioral2/memory/3420-70-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2900-162-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4656-163-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4464-191-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3420-194-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/2900-195-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4656-197-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4464-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x0007000000023413-5.dat upx behavioral2/memory/3420-70-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2900-162-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4656-163-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4464-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3420-194-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2900-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4656-197-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\S: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\Q: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\W: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\X: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\G: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\H: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\K: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\O: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\P: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\B: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\U: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\V: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\Y: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\Z: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\N: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\R: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\T: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\E: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\I: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\J: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\L: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File opened (read-only) \??\M: 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\beastiality porn public legs .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\System32\DriverStore\Temp\danish lingerie lesbian blondie .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\FxsTmp\indian hardcore hot (!) .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\IME\SHARED\gay bukkake big .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lesbian [free] ash (Jade,Sylvia).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\animal beastiality uncut (Sandy,Melissa).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\IME\SHARED\gay bukkake [free] boots (Tatjana,Jenna).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\xxx fucking [free] ash (Kathrin).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\chinese cumshot beast [bangbus] 50+ .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\asian beastiality horse lesbian 50+ .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese blowjob xxx [milf] wifey .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SysWOW64\FxsTmp\italian lingerie fucking lesbian girly .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\spanish lingerie lesbian [milf] .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Microsoft\Temp\african cum hidden stockings .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Common Files\microsoft shared\horse [milf] .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\dotnet\shared\french bukkake lingerie masturbation titts balls .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\british action licking ash .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\beast uncut hole high heels .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\black gay horse masturbation (Gina).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\gay [free] fishy (Gina,Liz).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\african lesbian sleeping (Karin,Curtney).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\brasilian nude horse hidden wifey (Tatjana).avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\blowjob catfight .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\british fetish girls (Sarah).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Google\Update\Download\spanish gay beastiality voyeur .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\root\Templates\indian sperm lesbian lesbian (Melissa).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\indian lingerie full movie hairy .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files\Microsoft Office\Updates\Download\german kicking animal girls latex .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\lingerie gang bang licking (Kathrin).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Program Files (x86)\Google\Temp\gay lesbian public glans .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\french porn handjob catfight legs (Melissa).avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\porn bukkake licking glans (Jenna).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_0341fea186758116\gang bang fetish girls leather .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\japanese cum lesbian swallow .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\italian gang bang hot (!) .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\indian fucking fetish voyeur hotel .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\cumshot several models boots .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\canadian bukkake nude masturbation shoes .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\lesbian voyeur gorgeoushorny .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\malaysia lingerie hardcore public titts .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938\beastiality masturbation (Sarah,Sylvia).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.746_none_292c449ed2edefa3\xxx kicking girls redhair (Britney,Jenna).avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_ca03036af4a5017e\cumshot handjob public .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\blowjob masturbation (Karin).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\beastiality trambling full movie wifey .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_c494b3b28da10665\german nude kicking several models legs black hairunshaved (Jenna,Britney).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_en-us_8dd6053a0a5910eb\bukkake trambling big traffic .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-vsssystemprovider_31bf3856ad364e35_10.0.19041.1_none_01240756137c3159\horse nude lesbian vagina leather .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\beastiality cumshot girls vagina .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\fetish several models granny (Sonja,Anniston).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\german kicking animal big cock .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\kicking uncut beautyfull .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\spanish fucking fetish catfight penetration .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\canadian sperm [milf] redhair (Jenna).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\canadian cumshot voyeur hole .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\norwegian porn hardcore uncut traffic (Sarah,Gina).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\Temp\african animal lesbian catfight hotel .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\cumshot gang bang uncut glans gorgeoushorny .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_netfx4-installsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_7636d1cd418015c8\trambling cum hot (!) cock Ôï (Sandy).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_6242879b1c08046f\beast public stockings .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.546_none_cd016aa683e5a345\kicking gang bang several models (Britney,Anniston).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\african blowjob bukkake uncut (Melissa).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\handjob full movie castration .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\gang bang public ash (Ashley,Kathrin).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_d980e9752d51efac\italian fucking girls glans blondie .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\gang bang nude hot (!) (Melissa).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\tyrkish animal uncut gorgeoushorny (Samantha,Kathrin).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_a06b29f6c4bab99e\french gang bang hidden shower (Sarah).zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\lingerie public feet upskirt (Sarah).rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\beast girls granny .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_fad1fa0072ef4a3a\asian xxx [free] .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\PLA\Templates\spanish handjob [bangbus] 50+ .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\brasilian lingerie sperm [milf] boobs young .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..acejoin-gptemplates_31bf3856ad364e35_10.0.19041.1_none_609f27436445f4da\african beast catfight ejaculation .avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\swedish fetish girls 50+ (Sylvia,Liz).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\trambling catfight gorgeoushorny .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\american animal [milf] shoes .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\german cumshot action voyeur .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\lesbian [free] legs stockings .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\brasilian lesbian full movie feet (Sarah,Melissa).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\canadian gang bang big nipples pregnant .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\german trambling [bangbus] hairy (Sarah,Gina).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\chinese trambling lesbian hot (!) .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.1_none_24f622f1fc5a3f3c\hardcore voyeur (Jade,Curtney).avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\black lingerie trambling public titts (Christine).avi.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\chinese kicking fetish girls leather (Sandy).mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.1_none_4a03fd12cb3f16c2\horse licking boobs .zip.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\x86_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_c049dbdb4e15bdd2\danish cumshot [free] boobs .mpeg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\russian kicking lingerie hot (!) .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\horse girls cock .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\norwegian porn fucking lesbian (Kathrin).rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\black fetish masturbation .rar.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\swedish gay fucking catfight traffic .mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-t..boration-sharer-api_31bf3856ad364e35_10.0.19041.84_none_cee95e04c201c860\british action beast voyeur granny (Anniston,Sylvia).mpg.exe 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4656 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 2900 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3420 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 91 PID 4464 wrote to memory of 3420 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 91 PID 4464 wrote to memory of 3420 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 91 PID 4464 wrote to memory of 2900 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 94 PID 4464 wrote to memory of 2900 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 94 PID 4464 wrote to memory of 2900 4464 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 94 PID 3420 wrote to memory of 4656 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 95 PID 3420 wrote to memory of 4656 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 95 PID 3420 wrote to memory of 4656 3420 38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
-
C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"C:\Users\Admin\AppData\Local\Temp\38ae7f86fb9a363b3cdbffb9603648f9dd46b7dd621d9269bef2ef96d09d6999.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
Network
-
Remote address:8.8.8.8:53Requestg.bing.comIN AResponseg.bing.comIN CNAMEg-bing-com.dual-a-0034.a-msedge.netg-bing-com.dual-a-0034.a-msedge.netIN CNAMEdual-a-0034.a-msedge.netdual-a-0034.a-msedge.netIN A204.79.197.237dual-a-0034.a-msedge.netIN A13.107.21.237
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MUID=26AA67B8699E6AD13CF273DB68B96B92; domain=.bing.com; expires=Sun, 11-May-2025 20:55:59 GMT; path=/; SameSite=None; Secure; Priority=High;
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 05024277AB9F48E4A2A6CE5C14F27DB7 Ref B: LON04EDGE0706 Ref C: 2024-04-16T20:55:59Z
date: Tue, 16 Apr 2024 20:55:58 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=26AA67B8699E6AD13CF273DB68B96B92
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
set-cookie: MSPTC=eY0UkAvxbqCE8pYaTjkJ54uIkCTc6pvqwo89raB6vdk; domain=.bing.com; expires=Sun, 11-May-2025 20:55:59 GMT; path=/; Partitioned; secure; SameSite=None
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: 3E3727BA046D4886B013AB27F3F597E1 Ref B: LON04EDGE0706 Ref C: 2024-04-16T20:55:59Z
date: Tue, 16 Apr 2024 20:55:58 GMT
-
GEThttps://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=Remote address:204.79.197.237:443RequestGET /neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid= HTTP/2.0
host: g.bing.com
accept-encoding: gzip, deflate
user-agent: WindowsShellClient/9.0.40929.0 (Windows)
cookie: MUID=26AA67B8699E6AD13CF273DB68B96B92; MSPTC=eY0UkAvxbqCE8pYaTjkJ54uIkCTc6pvqwo89raB6vdk
ResponseHTTP/2.0 204
pragma: no-cache
expires: Fri, 01 Jan 1990 00:00:00 GMT
strict-transport-security: max-age=31536000; includeSubDomains; preload
access-control-allow-origin: *
x-cache: CONFIG_NOCACHE
accept-ch: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
x-msedge-ref: Ref A: DB75987410654AC0BA78C53D032C73D5 Ref B: LON04EDGE0706 Ref C: 2024-04-16T20:55:59Z
date: Tue, 16 Apr 2024 20:55:58 GMT
-
Remote address:8.8.8.8:53Request249.197.17.2.in-addr.arpaIN PTRResponse249.197.17.2.in-addr.arpaIN PTRa2-17-197-249deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request241.154.82.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request237.197.79.204.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request25.63.96.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request21.114.53.23.in-addr.arpaIN PTRResponse21.114.53.23.in-addr.arpaIN PTRa23-53-114-21deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request134.137.67.149.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.129.131.169.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.129.131.169.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request233.129.131.169.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request38.204.13.92.in-addr.arpaIN PTRResponse38.204.13.92.in-addr.arpaIN PTRhost-92-13-204-38as13285net
-
Remote address:8.8.8.8:53Request88.126.233.62.in-addr.arpaIN PTRResponse88.126.233.62.in-addr.arpaIN PTRno-ptras20860net
-
Remote address:8.8.8.8:53Request88.14.59.50.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.12.40.22.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request184.167.109.34.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request100.89.25.72.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request175.149.36.55.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request155.59.46.228.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request62.204.36.189.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request50.154.193.82.in-addr.arpaIN PTRResponse50.154.193.82.in-addr.arpaIN PTR82x193x154x50static-businessekb ertelecomru
-
Remote address:8.8.8.8:53Request34.134.109.74.in-addr.arpaIN PTRResponse34.134.109.74.in-addr.arpaIN PTRpool-74-109-134-34chrlwveastverizonnet
-
Remote address:8.8.8.8:53Request31.251.166.21.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request59.195.124.250.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request54.238.211.254.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request89.66.11.110.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request159.242.49.181.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request102.71.198.166.in-addr.arpaIN PTRResponse102.71.198.166.in-addr.arpaIN PTRmobile-166-198-071-102 mycingularnet
-
Remote address:8.8.8.8:53Request57.45.168.133.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request167.125.75.35.in-addr.arpaIN PTRResponse167.125.75.35.in-addr.arpaIN PTRec2-35-75-125-167ap-northeast-1compute amazonawscom
-
Remote address:8.8.8.8:53Request242.211.100.168.in-addr.arpaIN PTRResponse242.211.100.168.in-addr.arpaIN PTR168-100-211-242 wavedirectnet
-
Remote address:8.8.8.8:53Request242.211.100.168.in-addr.arpaIN PTRResponse242.211.100.168.in-addr.arpaIN PTR168-100-211-242 wavedirectnet
-
Remote address:8.8.8.8:53Request4.59.217.38.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request4.59.217.38.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request44.195.136.83.in-addr.arpaIN PTRResponse44.195.136.83.in-addr.arpaIN PTR44 195-136-83ddfrnl
-
Remote address:8.8.8.8:53Request44.195.136.83.in-addr.arpaIN PTRResponse44.195.136.83.in-addr.arpaIN PTR44 195-136-83ddfrnl
-
Remote address:8.8.8.8:53Request92.56.194.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.187.213.133.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.187.213.133.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.108.132.221.in-addr.arpaIN PTRResponse1.108.132.221.in-addr.arpaIN PTRdhcp26001orihimenejp
-
Remote address:8.8.8.8:53Request1.108.132.221.in-addr.arpaIN PTRResponse1.108.132.221.in-addr.arpaIN PTRdhcp26001orihimenejp
-
Remote address:8.8.8.8:53Request245.52.182.144.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request202.116.54.47.in-addr.arpaIN PTRResponse202.116.54.47.in-addr.arpaIN PTRdrmons0559w-47-54-116-202 pppoe-dynamic high-speedns bellaliantnet
-
Remote address:8.8.8.8:53Request202.116.54.47.in-addr.arpaIN PTRResponse202.116.54.47.in-addr.arpaIN PTRdrmons0559w-47-54-116-202 pppoe-dynamic high-speedns bellaliantnet
-
Remote address:8.8.8.8:53Request235.211.58.241.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request98.133.7.188.in-addr.arpaIN PTRResponse98.133.7.188.in-addr.arpaIN PTR981337188revsfrnet
-
Remote address:8.8.8.8:53Request98.133.7.188.in-addr.arpaIN PTRResponse98.133.7.188.in-addr.arpaIN PTR981337188revsfrnet
-
Remote address:8.8.8.8:53Request112.31.141.213.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request112.31.141.213.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.206.210.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.206.210.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request148.153.149.63.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request148.153.149.63.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request39.134.196.115.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request39.134.196.115.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request199.93.111.12.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request199.93.111.12.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request193.169.81.29.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request24.153.97.148.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request255.248.71.82.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request77.157.22.252.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request43.229.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request240.197.17.2.in-addr.arpaIN PTRResponse240.197.17.2.in-addr.arpaIN PTRa2-17-197-240deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request255.178.165.88.in-addr.arpaIN PTRResponse255.178.165.88.in-addr.arpaIN PTR88-165-178-255subsproxadnet
-
Remote address:8.8.8.8:53Request255.178.165.88.in-addr.arpaIN PTRResponse255.178.165.88.in-addr.arpaIN PTR88-165-178-255subsproxadnet
-
Remote address:8.8.8.8:53Request245.113.151.130.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request245.113.151.130.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request145.55.222.26.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request3.245.134.93.in-addr.arpaIN PTRResponse3.245.134.93.in-addr.arpaIN PTRdynamic-093-134-245-00393134pool telefonicade
-
Remote address:8.8.8.8:53Request3.245.134.93.in-addr.arpaIN PTRResponse3.245.134.93.in-addr.arpaIN PTRdynamic-093-134-245-00393134pool telefonicade
-
Remote address:8.8.8.8:53Request65.116.242.95.in-addr.arpaIN PTRResponse65.116.242.95.in-addr.arpaIN PTRhost-95-242-116-65business telecomitaliait
-
Remote address:8.8.8.8:53Request65.116.242.95.in-addr.arpaIN PTRResponse65.116.242.95.in-addr.arpaIN PTRhost-95-242-116-65business telecomitaliait
-
Remote address:8.8.8.8:53Request153.91.143.125.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request153.91.143.125.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request5.45.58.135.in-addr.arpaIN PTRResponse5.45.58.135.in-addr.arpaIN PTRnothingattdnscom
-
Remote address:8.8.8.8:53Request5.45.58.135.in-addr.arpaIN PTRResponse5.45.58.135.in-addr.arpaIN PTRnothingattdnscom
-
Remote address:8.8.8.8:53Request164.36.12.241.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request38.140.35.219.in-addr.arpaIN PTRResponse38.140.35.219.in-addr.arpaIN PTRsoftbank219035140038bbtecnet
-
Remote address:8.8.8.8:53Request38.140.35.219.in-addr.arpaIN PTRResponse38.140.35.219.in-addr.arpaIN PTRsoftbank219035140038bbtecnet
-
Remote address:8.8.8.8:53Request136.67.154.72.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request61.10.137.222.in-addr.arpaIN PTRResponse61.10.137.222.in-addr.arpaIN PTRhnkdnyadsl
-
Remote address:8.8.8.8:53Request61.10.137.222.in-addr.arpaIN PTRResponse61.10.137.222.in-addr.arpaIN PTRhnkdnyadsl
-
Remote address:8.8.8.8:53Request142.241.221.181.in-addr.arpaIN PTRResponse142.241.221.181.in-addr.arpaIN PTRb5ddf18evirtuacombr
-
Remote address:8.8.8.8:53Request142.241.221.181.in-addr.arpaIN PTRResponse142.241.221.181.in-addr.arpaIN PTRb5ddf18evirtuacombr
-
Remote address:8.8.8.8:53Request130.198.126.28.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request250.228.213.140.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request70.193.201.82.in-addr.arpaIN PTRResponse70.193.201.82.in-addr.arpaIN PTRhost-82-201-193-70staticlinknet
-
Remote address:8.8.8.8:53Request70.193.201.82.in-addr.arpaIN PTRResponse70.193.201.82.in-addr.arpaIN PTRhost-82-201-193-70staticlinknet
-
Remote address:8.8.8.8:53Request2.86.188.97.in-addr.arpaIN PTRResponse2.86.188.97.in-addr.arpaIN PTR2 sub-97-188-86myvzwcom
-
Remote address:8.8.8.8:53Request2.86.188.97.in-addr.arpaIN PTRResponse2.86.188.97.in-addr.arpaIN PTR2 sub-97-188-86myvzwcom
-
Remote address:8.8.8.8:53Request13.124.224.145.in-addr.arpaIN PTRResponse13.124.224.145.in-addr.arpaIN PTRcustomermdrdesp1popstarlinkispnet
-
Remote address:8.8.8.8:53Request61.121.143.88.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request156.51.154.202.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request151.44.3.181.in-addr.arpaIN PTRResponse151.44.3.181.in-addr.arpaIN PTRhost151181-3-44telecomnetar
-
Remote address:8.8.8.8:53Request151.44.3.181.in-addr.arpaIN PTRResponse151.44.3.181.in-addr.arpaIN PTRhost151181-3-44telecomnetar
-
Remote address:8.8.8.8:53Request235.241.34.59.in-addr.arpaIN PTRResponse235.241.34.59.in-addr.arpaIN PTR2352413459broadzjgddynamic163datacomcn
-
Remote address:8.8.8.8:53Request235.241.34.59.in-addr.arpaIN PTRResponse235.241.34.59.in-addr.arpaIN PTR2352413459broadzjgddynamic163datacomcn
-
204.79.197.237:443https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=tls, http22.0kB 9.2kB 22 19
HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreative&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=HTTP Response
204HTTP Request
GET https://g.bing.com/neg/0?action=emptycreativeimpression&adUnitId=11730597&publisherId=251978541&rid=967cd7feefe7467099c545e42faab114&localId=w:82014CF4-DC18-5C6E-6DB2-ACA702FC47E3&deviceId=6896199938616243&anid=HTTP Response
204 -
46 B 1
-
322 B 7
-
56 B 151 B 1 1
DNS Request
g.bing.com
DNS Response
204.79.197.23713.107.21.237
-
71 B 135 B 1 1
DNS Request
249.197.17.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
241.154.82.20.in-addr.arpa
-
73 B 143 B 1 1
DNS Request
237.197.79.204.in-addr.arpa
-
70 B 156 B 1 1
DNS Request
25.63.96.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
21.114.53.23.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
73 B 131 B 1 1
DNS Request
134.137.67.149.in-addr.arpa
-
222 B 222 B 3 3
DNS Request
233.129.131.169.in-addr.arpa
DNS Request
233.129.131.169.in-addr.arpa
DNS Request
233.129.131.169.in-addr.arpa
-
71 B 114 B 1 1
DNS Request
38.204.13.92.in-addr.arpa
-
72 B 104 B 1 1
DNS Request
88.126.233.62.in-addr.arpa
-
70 B 138 B 1 1
DNS Request
88.14.59.50.in-addr.arpa
-
71 B 139 B 1 1
DNS Request
182.12.40.22.in-addr.arpa
-
73 B 73 B 1 1
DNS Request
184.167.109.34.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
100.89.25.72.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
175.149.36.55.in-addr.arpa
-
72 B 129 B 1 1
DNS Request
155.59.46.228.in-addr.arpa
-
72 B 130 B 1 1
DNS Request
62.204.36.189.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
50.154.193.82.in-addr.arpa
-
72 B 128 B 1 1
DNS Request
34.134.109.74.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
31.251.166.21.in-addr.arpa
-
73 B 141 B 1 1
DNS Request
59.195.124.250.in-addr.arpa
-
73 B 141 B 1 1
DNS Request
54.238.211.254.in-addr.arpa
-
71 B 130 B 1 1
DNS Request
89.66.11.110.in-addr.arpa
-
73 B 137 B 1 1
DNS Request
159.242.49.181.in-addr.arpa
-
73 B 124 B 1 1
DNS Request
102.71.198.166.in-addr.arpa
-
72 B 121 B 1 1
DNS Request
57.45.168.133.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
167.125.75.35.in-addr.arpa
-
148 B 236 B 2 2
DNS Request
242.211.100.168.in-addr.arpa
DNS Request
242.211.100.168.in-addr.arpa
-
140 B 256 B 2 2
DNS Request
4.59.217.38.in-addr.arpa
DNS Request
4.59.217.38.in-addr.arpa
-
144 B 214 B 2 2
DNS Request
44.195.136.83.in-addr.arpa
DNS Request
44.195.136.83.in-addr.arpa
-
72 B 143 B 1 1
DNS Request
92.56.194.192.in-addr.arpa
-
146 B 272 B 2 2
DNS Request
73.187.213.133.in-addr.arpa
DNS Request
73.187.213.133.in-addr.arpa
-
144 B 218 B 2 2
DNS Request
1.108.132.221.in-addr.arpa
DNS Request
1.108.132.221.in-addr.arpa
-
73 B 127 B 1 1
DNS Request
245.52.182.144.in-addr.arpa
-
144 B 308 B 2 2
DNS Request
202.116.54.47.in-addr.arpa
DNS Request
202.116.54.47.in-addr.arpa
-
73 B 141 B 1 1
DNS Request
235.211.58.241.in-addr.arpa
-
142 B 218 B 2 2
DNS Request
98.133.7.188.in-addr.arpa
DNS Request
98.133.7.188.in-addr.arpa
-
146 B 272 B 2 2
DNS Request
112.31.141.213.in-addr.arpa
DNS Request
112.31.141.213.in-addr.arpa
-
146 B 336 B 2 2
DNS Request
18.206.210.199.in-addr.arpa
DNS Request
18.206.210.199.in-addr.arpa
-
146 B 304 B 2 2
DNS Request
148.153.149.63.in-addr.arpa
DNS Request
148.153.149.63.in-addr.arpa
-
146 B 260 B 2 2
DNS Request
39.134.196.115.in-addr.arpa
DNS Request
39.134.196.115.in-addr.arpa
-
144 B 318 B 2 2
DNS Request
199.93.111.12.in-addr.arpa
DNS Request
199.93.111.12.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
193.169.81.29.in-addr.arpa
-
72 B 126 B 1 1
DNS Request
24.153.97.148.in-addr.arpa
-
72 B 131 B 1 1
DNS Request
255.248.71.82.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
77.157.22.252.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
43.229.111.52.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
240.197.17.2.in-addr.arpa
-
146 B 234 B 2 2
DNS Request
255.178.165.88.in-addr.arpa
DNS Request
255.178.165.88.in-addr.arpa
-
148 B 148 B 2 2
DNS Request
245.113.151.130.in-addr.arpa
DNS Request
245.113.151.130.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
145.55.222.26.in-addr.arpa
-
142 B 268 B 2 2
DNS Request
3.245.134.93.in-addr.arpa
DNS Request
3.245.134.93.in-addr.arpa
-
144 B 260 B 2 2
DNS Request
65.116.242.95.in-addr.arpa
DNS Request
65.116.242.95.in-addr.arpa
-
146 B 258 B 2 2
DNS Request
153.91.143.125.in-addr.arpa
DNS Request
153.91.143.125.in-addr.arpa
-
140 B 204 B 2 2
DNS Request
5.45.58.135.in-addr.arpa
DNS Request
5.45.58.135.in-addr.arpa
-
72 B 140 B 1 1
DNS Request
164.36.12.241.in-addr.arpa
-
144 B 232 B 2 2
DNS Request
38.140.35.219.in-addr.arpa
DNS Request
38.140.35.219.in-addr.arpa
-
72 B 159 B 1 1
DNS Request
136.67.154.72.in-addr.arpa
-
144 B 198 B 2 2
DNS Request
61.10.137.222.in-addr.arpa
DNS Request
61.10.137.222.in-addr.arpa
-
148 B 220 B 2 2
DNS Request
142.241.221.181.in-addr.arpa
DNS Request
142.241.221.181.in-addr.arpa
-
73 B 141 B 1 1
DNS Request
130.198.126.28.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
250.228.213.140.in-addr.arpa
-
144 B 240 B 2 2
DNS Request
70.193.201.82.in-addr.arpa
DNS Request
70.193.201.82.in-addr.arpa
-
140 B 218 B 2 2
DNS Request
2.86.188.97.in-addr.arpa
DNS Request
2.86.188.97.in-addr.arpa
-
73 B 124 B 1 1
DNS Request
13.124.224.145.in-addr.arpa
-
72 B 132 B 1 1
DNS Request
61.121.143.88.in-addr.arpa
-
73 B 73 B 1 1
DNS Request
156.51.154.202.in-addr.arpa
-
142 B 232 B 2 2
DNS Request
151.44.3.181.in-addr.arpa
DNS Request
151.44.3.181.in-addr.arpa
-
144 B 268 B 2 2
DNS Request
235.241.34.59.in-addr.arpa
DNS Request
235.241.34.59.in-addr.arpa
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\british action licking ash .avi.exe
Filesize1.5MB
MD56f00dc013781dc933c55300a6fb74233
SHA13b12247e9b1f6a8951a6ffbadab9f32437e01229
SHA2569ef04bfc137c152ff058392947756e5a29b3637d8cfbcb00d2a43fe49480959e
SHA512ef18d4a78c7ad05d9f16591eba7e07ad7b6373dd72e6ce196bf1b32f0700d12d697417d132b0d48fd274e3ae51f04ea584ce490285f2020cff56a12df1d2cd4a