Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 18:16
Static task
static1
Behavioral task
behavioral1
Sample
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Resource
win10v2004-20240426-en
General
-
Target
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
-
Size
1.9MB
-
MD5
e996a72155566902e4097522a9b12b37
-
SHA1
9ff642cfb820a15b86fc945871b7697b4d3468a4
-
SHA256
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f
-
SHA512
3a558f03d1176c370014588f9e28d71d0c4c50226055674ad206050c5e0fb597b9fb91e89ef37587c1e7204b791b190de814cb149ca3b16dc9939b4ad4de665f
-
SSDEEP
49152:uvcpoKq2R0hpziSDJTajPDuXKOPa/DnJ6SAUBvKvdd5IFFVqEC6bJ:+cei04jP8jQDnJ6SAU0vdd4FVqaJ
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-65-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2880-90-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-94-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2780-103-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2880-104-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-105-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-109-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-112-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-115-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-120-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-123-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-126-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-129-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-132-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-135-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-138-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-141-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral1/memory/2864-144-0x0000000000400000-0x000000000041C000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2864-0-0x0000000000400000-0x000000000041C000-memory.dmp UPX C:\Program Files\Windows Sidebar\Shared Gadgets\gay bukkake [bangbus] .avi.exe UPX behavioral1/memory/2780-65-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2780-89-0x00000000046C0000-0x00000000046DC000-memory.dmp UPX behavioral1/memory/2880-90-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-94-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2780-103-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2880-104-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-105-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-109-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-112-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-115-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-120-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-123-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-126-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-129-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-132-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-135-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-138-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-141-0x0000000000400000-0x000000000041C000-memory.dmp UPX behavioral1/memory/2864-144-0x0000000000400000-0x000000000041C000-memory.dmp UPX -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File opened (read-only) \??\E: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\O: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\S: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\V: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\H: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\J: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\T: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\W: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Z: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\P: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Q: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\A: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\B: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\G: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\I: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\L: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\N: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\R: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\X: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\Y: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\K: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\M: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File opened (read-only) \??\U: 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in System32 directory 10 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Windows\SysWOW64\IME\shared\asian bukkake hardcore several models boots (Anniston).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese cum [free] ash .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\FxsTmp\swedish action big high heels .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\tyrkish xxx hot (!) nipples hotel .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\trambling kicking full movie fishy .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\FxsTmp\blowjob hidden boots (Christine,Jade).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\spanish sperm beast full movie granny (Janette).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\System32\DriverStore\Temp\malaysia cum several models Ôë (Melissa,Samantha).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\IME\shared\lesbian sleeping (Sylvia,Janette).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\SysWOW64\config\systemprofile\blowjob lesbian hot (!) latex .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in Program Files directory 15 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\IDTemplates\xxx bukkake uncut legs (Jade,Jenna).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Google\Update\Download\canadian fucking voyeur latex .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Office\Templates\gay fucking hot (!) .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\xxx several models (Sylvia,Karin).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Common Files\microsoft shared\british blowjob bukkake public granny .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\XML Files\Space Templates\kicking trambling several models ejaculation .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\beast licking .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\DVD Maker\Shared\brasilian lesbian public mature (Melissa).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Windows Journal\Templates\chinese gay uncut leather .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\gay bukkake [bangbus] .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files\Common Files\Microsoft Shared\asian bukkake catfight vagina balls .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Google\Temp\fetish beastiality several models 40+ .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\DocumentShare\british porn voyeur .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsTemplates\japanese xxx cum [free] hairy .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Notebook Templates\malaysia lesbian lingerie full movie legs .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Drops file in Windows directory 64 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription ioc process File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ad7c61fb28607522\trambling masturbation sweet (Karin).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_6.1.7600.16385_none_af6f98ff87b0e3cc\lingerie action [free] lady .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-m..-temptable-provider_31bf3856ad364e35_6.1.7600.16385_none_1dd3ce8d1e7524cd\fucking lesbian leather .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\security\templates\french lesbian cum hidden blondie .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_it-it_ea4a469ab7713182\tyrkish lingerie fetish catfight high heels (Janette).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\japanese fetish [milf] .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-systempropertiesremote_31bf3856ad364e35_6.1.7600.16385_none_94ab98ac6d213009\handjob beastiality hidden black hairunshaved (Curtney).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\horse full movie .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_cd2006602e5ee22e\danish animal bukkake voyeur ìï .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAPE291.tmp\fucking trambling voyeur lady .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\brasilian sperm lesbian .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_6.1.7601.17514_none_6f0f7833cb71e18d\bukkake porn licking hole .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_6.1.7601.17514_none_34400a5790d1d336\nude [free] cock ìï .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_6.1.7601.17514_none_39374e2435a71b47\cumshot fucking [free] boots .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_16a2bb1dbab1c595\danish horse several models titts pregnant (Tatjana,Anniston).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\canadian lingerie uncut beautyfull .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\ZAP6B8E.tmp\swedish blowjob blowjob licking ash .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_6.1.7600.16385_none_dba3691c6002e10e\cum uncut feet femdom .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_6.1.7600.16385_none_c26c5b8280c6af34\trambling beastiality girls boobs leather .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm_31bf3856ad364e35_6.1.7600.16385_none_5499606faffb3f9f\danish action [free] vagina (Christine,Christine).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_1412267f4b3bb985\asian kicking horse hot (!) blondie .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_ac16749b75335680\cumshot voyeur wifey (Liz,Sonja).avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sx-shared_31bf3856ad364e35_6.1.7600.16385_none_387a16fe7addf3b6\kicking cumshot sleeping YEâPSè& (Samantha,Sandy).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_6.1.7600.16385_none_5e4ff1f4cf2dee9b\italian blowjob horse several models (Tatjana,Sarah).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_6.1.7600.16385_none_49dd84a06c7c8863\handjob uncut nipples hotel .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_0ac4ebfc358e5ec0\british blowjob sperm several models mistress (Sonja).mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\mssrv.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\handjob girls girly .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aedaf3947d09fbe5\gang bang girls boobs castration (Liz).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_es-es_aea650787d30ed8a\black hardcore lesbian legs gorgeoushorny .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_de-de_b4aea777fe683838\kicking gang bang [bangbus] .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_6.1.7601.17514_none_f3c374fc18118ca2\brasilian kicking public .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_6.1.7601.17514_none_d81c96999f75bd77\cumshot [free] hole .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\Temp\danish kicking trambling licking nipples upskirt .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\temp\gang bang horse public .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Temporary ASP.NET Files\animal fetish big ash .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_it-it_8d9f242de8497d58\italian animal catfight .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_es-es_095efe9c8261401e\cumshot cumshot girls hole .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_en-us_8bfc34b93f0fdd42\norwegian horse uncut traffic .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\indian action cum voyeur high heels .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_6.1.7600.16385_none_293ea1e3e6bc5364\american porn full movie .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\InstallTemp\fucking several models circumcision .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedfoldersui_31bf3856ad364e35_6.1.7600.16385_none_b7f38afb92de484f\cumshot cumshot hot (!) .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_39c9d74ef2ad6c7b\action action full movie .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_netfx-shared_netfx_20_perfcounter_31bf3856ad364e35_6.1.7600.16385_none_a945e2c500c90142\british beastiality cumshot sleeping vagina .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_3863e9ef3f804dd9\norwegian lingerie bukkake [bangbus] boots .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_f25d066604c2ad34\malaysia action gay big vagina young .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-h..-hmeshare.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_00225053e03f4c04\xxx fucking big hairy .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_6.1.7601.17514_none_98b24799b5d08c05\bukkake uncut ìï .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_2fc4a33adb648f33\british animal sleeping castration .mpeg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_6.1.7600.16385_none_6377027f0030a06a\norwegian nude handjob public boobs .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_it-it_18a6fde3093acac7\cum girls glans .mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\assembly\tmp\norwegian sperm beastiality girls swallow (Karin,Janette).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\malaysia fucking handjob girls feet .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_515dc677700303ec\swedish porn several models (Janette,Sarah).rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ddab3bcb3a4ffb45\german fetish trambling licking redhair .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\Downloaded Program Files\danish beastiality gay lesbian mature .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0af98f1835676d1b\spanish sperm [bangbus] YEâPSè& (Jade,Sylvia).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_6.1.7600.16385_de-de_e30b5ec05031d17d\tyrkish horse sperm licking balls (Tatjana).mpg.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_94828572f7ddbf0f\blowjob several models lady .rar.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_a3772de7111797da\british handjob sperm licking .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\x86_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_6.1.7600.16385_it-it_963e6ae24c653bfe\malaysia lesbian trambling big glans latex .avi.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Windows\Temporary Internet Files\black blowjob full movie gorgeoushorny (Sandy).zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe File created C:\Windows\winsxs\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5803850b2f40840e\german blowjob animal [bangbus] balls .zip.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exepid process 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 2880 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exedescription pid process target process PID 2864 wrote to memory of 2780 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2864 wrote to memory of 2780 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2864 wrote to memory of 2780 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2864 wrote to memory of 2780 2864 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2780 wrote to memory of 2880 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2780 wrote to memory of 2880 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2780 wrote to memory of 2880 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe PID 2780 wrote to memory of 2880 2780 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe 042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"C:\Users\Admin\AppData\Local\Temp\042fd8a6077bfa57d9d3aee573422b3d08cbccf1d8388ac8245c20493a81e21f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows Sidebar\Shared Gadgets\gay bukkake [bangbus] .avi.exeFilesize
259KB
MD5d48e8c5fe65920ebfb24a8091dc29a60
SHA1f76c2d2cade20e337b16842baa2d1a5021a93576
SHA25652c27ac02c00ffe984fa0f13daecd2f3f76a7ff348abde95766f0e620f867ca6
SHA5125d6cff7300c8ce04d0e903c068f10a7f1b488ee0c02d3e7cda4f1d480a683a01597cfa88c17fd9e78c8ee074c74b791a61f86814e0c623babae220835692a6b6
-
C:\debug.txtFilesize
183B
MD5b3af0173cd6f82472008051a3721826e
SHA1e5d912bfcdfa81124d5a1dfeecb906daebde9054
SHA2560fde2cda704e02478b806bbc254db9c4c4f21fb962be654717c87dffb60ca930
SHA51249eeecbaaea79e81ba00ed5de35d4d2a54b8cabb37fed99a133a83fb7e5c973e92c5a2127384aebf77150fb2b56e51c8f0188b6936c07e9bb1321655186c1667
-
memory/2780-65-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2780-103-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2780-89-0x00000000046C0000-0x00000000046DC000-memory.dmpFilesize
112KB
-
memory/2864-109-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-115-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-144-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-64-0x00000000006E0000-0x00000000006FC000-memory.dmpFilesize
112KB
-
memory/2864-141-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-105-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-107-0x00000000006E0000-0x00000000006FC000-memory.dmpFilesize
112KB
-
memory/2864-0-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-112-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-94-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-120-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-123-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-126-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-129-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-132-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-135-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2864-138-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2880-104-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB
-
memory/2880-90-0x0000000000400000-0x000000000041C000-memory.dmpFilesize
112KB