Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 23:33
Behavioral task
behavioral1
Sample
820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe
Resource
win10v2004-20240226-en
General
-
Target
820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe
-
Size
1.4MB
-
MD5
15f6dbce6e46d9deb85a6cf09f91035e
-
SHA1
4ecbcda6f16f77db52490e9052a238a8c18e078f
-
SHA256
820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201
-
SHA512
8d41efce53e61e8490f2326de61a3672a8c9bd34dd69f4734061989cac353476281d73134b60871fe898dec4e661259f7bdb3e28314aebf3f60d8cad311729e9
-
SSDEEP
24576:gWV50Ip4Bdhq41hTpP6oN1XjrupQh9yxd0iW420lFQ6Q031WsXpU+JlGk:pVvmdhq417/W+AL0iUmI7+gk
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/3248-11-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/376-12-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-13-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-15-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3244-16-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-17-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/376-20-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/228-21-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-71-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-155-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-167-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-184-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-193-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-208-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-212-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-216-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-221-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-224-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-228-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3248-232-0x0000000000400000-0x0000000000420000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 22 IoCs
resource yara_rule behavioral2/memory/3248-0-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/files/0x0007000000023262-5.dat UPX behavioral2/memory/3248-11-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/376-12-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/228-13-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-15-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3244-16-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-17-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/376-20-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/228-21-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-71-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-155-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-167-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-184-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-193-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-208-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-212-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-216-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-221-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-224-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-228-0x0000000000400000-0x0000000000420000-memory.dmp UPX behavioral2/memory/3248-232-0x0000000000400000-0x0000000000420000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3248-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x0007000000023262-5.dat upx behavioral2/memory/3248-11-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/376-12-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/228-13-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-15-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3244-16-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-17-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/376-20-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/228-21-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-71-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-155-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-167-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-184-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-193-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-208-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-212-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-216-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-221-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-224-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-228-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3248-232-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\Z: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\Q: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\T: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\U: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\W: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\R: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\X: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\E: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\I: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\L: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\O: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\B: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\H: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\M: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\V: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\N: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\P: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\S: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\A: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\G: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\J: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File opened (read-only) \??\K: 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\gay girls balls .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\gay [bangbus] upskirt .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\IME\SHARED\bukkake several models .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\lesbian [milf] sweet .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\black kicking blowjob uncut pregnant (Ashley,Tatjana).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fucking uncut 50+ .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\config\systemprofile\german hardcore [bangbus] lady .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\FxsTmp\danish porn beast several models glans shoes .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\bukkake [free] (Sarah).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\config\systemprofile\bukkake [free] titts circumcision .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\System32\DriverStore\Temp\black cumshot beast uncut hairy (Ashley,Melissa).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SysWOW64\FxsTmp\chinese gay [bangbus] .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\indian cum fucking lesbian hole bondage .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\black cumshot trambling hot (!) feet (Ashley,Samantha).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Common Files\microsoft shared\japanese fetish xxx hidden feet wifey .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\brasilian porn fucking lesbian (Liz).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\fetish gay several models titts .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Google\Temp\blowjob girls feet pregnant .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Google\Update\Download\italian animal bukkake [free] mistress (Sonja,Liz).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\root\Templates\tyrkish kicking gay uncut penetration (Gina,Liz).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\blowjob [bangbus] cock (Jenna,Melissa).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\russian beastiality fucking big .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\japanese fetish blowjob several models mature (Anniston,Jade).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\brasilian gang bang xxx catfight shower .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\blowjob voyeur sweet .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\dotnet\shared\bukkake lesbian titts .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lesbian [milf] cock shower (Samantha).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Microsoft\Temp\italian animal lingerie voyeur titts .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\blowjob public sm .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\tyrkish handjob horse voyeur titts leather (Liz).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Program Files\Microsoft Office\Updates\Download\beast [bangbus] .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\swedish gang bang hardcore hidden .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-ime-eashared-proxy_31bf3856ad364e35_10.0.19041.1_none_4c786ae2f508e6d5\black fetish gay big glans .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\italian beastiality sperm lesbian titts traffic .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\security\templates\italian animal gay hidden (Liz).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\Downloaded Program Files\lesbian several models swallow .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\gay masturbation titts sweet .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\swedish horse sperm lesbian hole .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\russian cum fucking licking (Liz).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\animal fucking [bangbus] leather .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\gang bang bukkake several models .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\assembly\tmp\american cum horse hidden hole .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\trambling uncut shoes .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\kicking hardcore several models titts (Gina,Liz).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\gang bang hardcore big .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\spanish hardcore [free] titts .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\japanese action lesbian sleeping (Melissa).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\russian porn lingerie public 40+ .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\asian fucking [free] (Sylvia).mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\PLA\Templates\horse lesbian cock castration (Melissa).mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\spanish bukkake girls cock .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\american beastiality beast several models gorgeoushorny .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\beast [bangbus] titts (Sonja,Sarah).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\asian fucking hidden hairy (Kathrin,Sarah).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\italian cumshot hardcore big balls .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\danish handjob fucking [bangbus] titts .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\swedish handjob blowjob hot (!) cock traffic (Jade).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\french lingerie voyeur glans granny .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\indian cumshot blowjob masturbation girly .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\german lesbian [free] fishy .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\italian kicking xxx hot (!) hotel .rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\bukkake licking .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\japanese action blowjob [milf] titts (Ashley,Curtney).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\gay [free] cock YEâPSè& .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\italian animal horse [bangbus] .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\chinese sperm hot (!) titts (Britney,Liz).mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\chinese beast [free] glans .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\danish kicking bukkake lesbian .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\black beastiality blowjob [free] feet bedroom .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\asian hardcore [free] (Liz).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\brasilian animal hardcore hidden feet traffic (Sarah).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\malaysia sperm hidden (Tatjana).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\tyrkish horse fucking masturbation .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\hardcore big feet .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\action fucking full movie titts (Ashley,Curtney).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\beastiality xxx hot (!) (Sarah).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\asian blowjob licking feet ash .avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\beastiality gay hidden sm .mpeg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\african beast girls bondage .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\InputMethod\SHARED\black animal lingerie several models shoes .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\handjob lesbian uncut (Tatjana).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\fetish gay public glans .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\american horse trambling full movie titts castration .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\french xxx masturbation hairy .zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\gang bang bukkake licking Ôï .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\spanish beast uncut cock .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\canadian bukkake [bangbus] young (Anniston,Curtney).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\nude beast sleeping (Janette).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\indian animal hardcore girls glans (Christine,Karin).rar.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\american gang bang fucking [milf] (Karin).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\asian bukkake masturbation cock .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\german blowjob several models (Tatjana).zip.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\british horse hidden (Samantha).avi.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\russian action gay full movie feet (Ashley,Jade).mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\swedish cumshot gay big hairy .mpg.exe 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 228 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 376 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3248 wrote to memory of 3244 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 91 PID 3248 wrote to memory of 3244 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 91 PID 3248 wrote to memory of 3244 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 91 PID 3248 wrote to memory of 376 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 92 PID 3248 wrote to memory of 376 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 92 PID 3248 wrote to memory of 376 3248 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 92 PID 3244 wrote to memory of 228 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 93 PID 3244 wrote to memory of 228 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 93 PID 3244 wrote to memory of 228 3244 820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"C:\Users\Admin\AppData\Local\Temp\820ad9350ca2178b293c41182bd8ee461a48227b35c6c1566caaf2ef22ccb201.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1408 --field-trial-handle=2280,i,4114443225282860369,4764091921472631035,262144 --variations-seed-version /prefetch:81⤵PID:3460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\lesbian [milf] cock shower (Samantha).avi.exe
Filesize1.3MB
MD59bd81ecfba1837736f725da6b2eabc76
SHA1f1146bc2ab7e2f0800b7c1a7e4a9e58e52e082da
SHA25696e5ed10d419435ab61fe49d04f08a997bb37d8825855f9c31501951020150f8
SHA512d761040e28b7a065b947c6940531a6bd8169de832a31d257ba67d152e872e7e3951c8ecf982002c00d2f21949374ec027c9eff65431300dd49205a7f43e55158