Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 03:00
Behavioral task
behavioral1
Sample
af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe
Resource
win10v2004-20240412-en
General
-
Target
af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe
-
Size
377KB
-
MD5
34ffc06a42d4db6f883a10650a5f5263
-
SHA1
99d53ccead2be811d25c78fcf4d123484742fdb4
-
SHA256
af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354
-
SHA512
96f10261a4e51764f39a0cec8fe844ce468981e4b21e22e0ef4f02a0e06cd6402ddcfefb30e230f645b3766b9832234cc4fcad23f9cacf62779fd80b8ac98ed7
-
SSDEEP
6144:CjluQoSIIo5Rrm6y1iZeineIN/KE6/o3gY6XaEa4U7ZAgzmfc63dSQwYiF1ESfxt:CEQoSse6y1iZeinjKE6/NrXitdzmfZ3O
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/2268-144-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1488-159-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3544-178-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4308-179-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-180-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-181-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-185-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-189-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-194-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-200-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-214-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-219-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-223-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-227-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-231-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-235-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2268-239-0x0000000000400000-0x000000000041F000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/2268-0-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/files/0x00070000000233d7-5.dat UPX behavioral2/memory/4308-33-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-144-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/1488-159-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/3544-178-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/4308-179-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-180-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-181-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-185-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-189-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-194-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-200-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-214-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-219-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-223-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-227-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-231-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-235-0x0000000000400000-0x000000000041F000-memory.dmp UPX behavioral2/memory/2268-239-0x0000000000400000-0x000000000041F000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe Key value queried \REGISTRY\USER\S-1-5-21-553605503-2331009851-2137262461-1000\Control Panel\International\Geo\Nation af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2268-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00070000000233d7-5.dat upx behavioral2/memory/4308-33-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-144-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1488-159-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3544-178-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4308-179-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-180-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-181-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-185-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-189-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-200-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-214-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-219-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-223-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-227-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-231-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-235-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2268-239-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\X: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\H: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\L: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\N: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\O: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\S: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\T: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\Y: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\W: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\B: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\E: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\G: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\I: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\M: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\R: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\A: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\Q: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\V: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\J: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\K: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\P: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File opened (read-only) \??\Z: af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\animal sperm big glans boots .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\config\systemprofile\danish handjob lingerie hot (!) glans .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\FxsTmp\lesbian [free] feet .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\IME\SHARED\american porn fucking catfight .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\config\systemprofile\lingerie full movie .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese animal hardcore hidden feet shoes (Karin).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\xxx hidden pregnant .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\swedish cum blowjob hidden beautyfull .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black nude blowjob licking black hairunshaved .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\japanese handjob beast [free] high heels .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian cum xxx [bangbus] .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\System32\DriverStore\Temp\black gang bang lesbian several models .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\lesbian several models upskirt (Gina,Janette).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Google\Update\Download\swedish nude bukkake hidden traffic .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\fucking girls leather (Ashley,Curtney).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\xxx catfight .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\japanese fetish hardcore hidden ejaculation .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\Updates\Download\trambling catfight feet hotel .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese cumshot sperm masturbation wifey .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\dotnet\shared\japanese nude lesbian [milf] .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\root\Templates\tyrkish porn trambling hidden penetration .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\indian animal xxx [bangbus] glans Ôï .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Microsoft\Temp\japanese cumshot lesbian hot (!) (Sylvia).zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian fetish bukkake sleeping feet shower (Jade).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\sperm uncut titts .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\spanish beast uncut .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\russian action fucking voyeur cock castration (Tatjana).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files (x86)\Google\Temp\malaysia lesbian public (Sylvia).mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Common Files\microsoft shared\bukkake hot (!) beautyfull .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\sperm [milf] glans ejaculation (Liz).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\american beastiality lingerie masturbation titts stockings (Sarah).rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\indian nude bukkake masturbation hole penetration .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\norwegian beast sleeping hole .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\trambling hidden ash .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\black nude hardcore hidden (Tatjana).rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_3a3c49005c947bac\handjob blowjob uncut feet .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\malaysia bukkake public hairy .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\swedish nude hardcore hidden titts stockings .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\horse bukkake hidden feet shower .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\british xxx [bangbus] glans .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\french trambling public feet fishy .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\gay hot (!) .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\british lesbian uncut (Jade).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_21122d7205c6f5b9\fetish bukkake girls gorgeoushorny .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\animal fucking licking titts .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\russian horse fucking girls cock girly .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\chinese trambling voyeur hole mature .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\danish kicking blowjob public .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_56adcc94becfef03\brasilian handjob horse girls .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_it-it_1a80ce63d483fe70\african sperm uncut .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\Downloaded Program Files\lingerie several models .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\japanese animal lesbian masturbation .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_10.0.19041.1_none_ae957c4c35a7bf73\norwegian lingerie licking glans (Sandy,Karin).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_6e0e425bd0e83959\sperm hidden .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\trambling [bangbus] (Liz).zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_93c5f32b7859ec4f\canadian beast [free] titts 50+ .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_56cd15352969a8d0\swedish beastiality gay [bangbus] feet .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_10.0.19041.1_none_77cfea69a421a4a1\kicking trambling hidden traffic .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SoftwareDistribution\Download\bukkake [bangbus] feet mature (Janette).zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\handjob hardcore lesbian (Curtney).rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\italian fetish sperm lesbian feet .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.84_none_85259eff919b7c9e\chinese blowjob lesbian leather .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\canadian hardcore [milf] titts ash .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\cum trambling [free] sweet .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\horse hot (!) titts pregnant .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_8d8f6812a0c99533\japanese cum xxx sleeping cock 40+ .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_6c85d64de79e0985\sperm public glans .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\lingerie [bangbus] titts mature .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_91025638be651781\african trambling uncut balls .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_b6514808f7d87b1a\french lingerie big .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\assembly\tmp\lingerie masturbation Ôï .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\trambling uncut (Samantha).mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\sperm big titts (Jenna,Sarah).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\american animal beast sleeping cock .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\chinese lingerie licking feet beautyfull .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_10.0.19041.1_none_a723631dce180fe0\indian gang bang xxx big blondie (Britney,Tatjana).zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\bukkake hot (!) ash .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_2610450c30b37cc4\horse hardcore big gorgeoushorny .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\fetish fucking several models gorgeoushorny .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_6c6bd34f082a97f1\cumshot beast voyeur .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\italian horse lesbian [free] hairy (Christine,Tatjana).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\animal beast hot (!) .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\german hardcore sleeping titts .rar.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_d58d4747b1d5988c\german xxx lesbian bedroom .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedpc-sharedpccsp_31bf3856ad364e35_10.0.19041.746_none_4cfe603abbcbfd86\cum blowjob sleeping cock shoes .avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_ee94ce5eb8e7e4c0\kicking beast hidden hole upskirt (Sarah).zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataoraclec.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_3b8d4dacc2ea6b71\russian action bukkake lesbian feet girly (Jade).avi.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\animal bukkake sleeping cock .mpeg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_d12f2a9a88909fc2\malaysia beast [bangbus] titts (Anniston,Janette).mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_de598551b74a3964\gang bang bukkake masturbation feet YEâPSè& .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sx-shared_31bf3856ad364e35_10.0.19041.1_none_f8e978b0ed48a6bb\japanese fetish hardcore uncut hole penetration .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\x86_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_231ddfc33015c6db\norwegian horse sleeping pregnant .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\hardcore [free] fishy .zip.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\american nude hardcore full movie feet .mpg.exe af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 4308 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 3544 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1488 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 84 PID 2268 wrote to memory of 1488 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 84 PID 2268 wrote to memory of 1488 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 84 PID 2268 wrote to memory of 3544 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 85 PID 2268 wrote to memory of 3544 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 85 PID 2268 wrote to memory of 3544 2268 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 85 PID 1488 wrote to memory of 4308 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 86 PID 1488 wrote to memory of 4308 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 86 PID 1488 wrote to memory of 4308 1488 af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
-
C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"C:\Users\Admin\AppData\Local\Temp\af3d9ef9c57bf0c4c7deadf0edd94c65b5fb106209960a4696a246313a3fd354.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese cumshot sperm masturbation wifey .mpg.exe
Filesize1.3MB
MD56d61f84654473306401adcc0eb174ed6
SHA1a28f2540b324159e0928fa67c8f5d6e8c5329a87
SHA256029edad866d431692e9027690d07b823b3cc9816eabfe33ffd4c9dfc69acd5cb
SHA5123afe33ac6b91947d2f8e471feaa997429a01ffb686316a26f2f03c335449fe11aa0559c03479af38dc7719dbc3b873945b00ef2c7b49f1cb7346766975730d01