Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2024, 00:50
Behavioral task
behavioral1
Sample
937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe
Resource
win10v2004-20240226-en
General
-
Target
937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe
-
Size
2.0MB
-
MD5
b1a202081a3090e998de9939d7c6706f
-
SHA1
4bceae4a58b7c56622386f016931b3ffa783031a
-
SHA256
937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f
-
SHA512
af266027b2f1e8cad827ea8e1a97d2b2c0d48f6bb6e379d3b6ac963869d0b9c5d9975e0ed3571f4f79078ea15f510713b73048262b5ef03a81a644fcda8192c4
-
SSDEEP
49152:OQ+bZUI+mIOWK58HDVRVbcHQEc9rRKeayXbHHgONtL587ZG2:OFOuJm5ncwvxRKeaysOaE2
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 17 IoCs
resource yara_rule behavioral2/memory/3452-13-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4652-59-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-86-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/4072-88-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1948-87-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-89-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-168-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-180-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-190-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-205-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-207-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-213-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-217-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-221-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-227-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-233-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3452-238-0x0000000000400000-0x000000000041E000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 20 IoCs
resource yara_rule behavioral2/memory/3452-0-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/files/0x000700000002328d-5.dat UPX behavioral2/memory/1948-11-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-13-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4652-59-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-86-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/4072-88-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/1948-87-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-89-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-168-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-180-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-190-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-205-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-207-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-213-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-217-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-221-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-227-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-233-0x0000000000400000-0x000000000041E000-memory.dmp UPX behavioral2/memory/3452-238-0x0000000000400000-0x000000000041E000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3452-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000700000002328d-5.dat upx behavioral2/memory/1948-11-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-13-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4652-59-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-86-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4072-88-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1948-87-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-89-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-168-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-180-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3452-238-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\I: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\S: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\N: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\O: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\Q: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\V: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\W: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\Z: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\H: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\K: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\J: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\M: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\P: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\T: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\U: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\A: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\B: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\L: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\R: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\X: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\E: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File opened (read-only) \??\G: 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\lesbian catfight .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\FxsTmp\swedish beastiality hardcore voyeur glans bedroom .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\japanese nude gay public titts .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\config\systemprofile\black cum lingerie several models sm .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\System32\DriverStore\Temp\black action gay girls bondage .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\fucking masturbation glans pregnant (Sylvia).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\lingerie lesbian .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\IME\SHARED\indian handjob blowjob public .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\blowjob big beautyfull .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\FxsTmp\tyrkish horse gay uncut latex .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SysWOW64\IME\SHARED\danish kicking trambling voyeur hole (Christine,Liz).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\bukkake uncut glans high heels .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\swedish cum hardcore [bangbus] glans .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\root\Templates\gay voyeur hole mistress .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\lesbian lesbian ejaculation .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\brasilian handjob lingerie full movie .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Common Files\microsoft shared\tyrkish action beast hot (!) glans sm .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\lesbian public glans (Christine,Curtney).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Google\Update\Download\trambling catfight traffic (Sonja,Melissa).zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\xxx lesbian .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\russian beastiality trambling full movie feet .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\Updates\Download\beast girls .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\lesbian public high heels (Sandy,Liz).mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Google\Temp\tyrkish nude blowjob hot (!) feet .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese fetish lesbian uncut cock .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\indian fetish blowjob girls hole young .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\fucking lesbian circumcision .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\black nude beast girls cock ash .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\beastiality trambling hidden shoes .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Install\{A22979E4-D188-4AF0-A888-04FE21284B11}\EDGEMITMP_19EA3.tmp\tyrkish porn horse several models feet gorgeoushorny .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Program Files (x86)\Microsoft\Temp\brasilian cumshot blowjob lesbian feet leather (Jade).zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\action trambling big (Melissa).mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\spanish blowjob hidden glans .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.746_none_96167fa49059f7a3\indian porn sperm sleeping glans .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\asian xxx licking swallow .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\spanish xxx uncut feet ash .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\african hardcore [milf] titts (Christine,Samantha).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\CbsTemp\swedish kicking beast catfight glans .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\blowjob public pregnant .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\horse lingerie voyeur (Sarah).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\russian cum blowjob [free] girly (Anniston,Melissa).zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet_installsqlstatetemp_b03f5f7f11d50a3a_10.0.19041.1_none_03040a328f65b761\asian lesbian full movie girly .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\horse uncut hole hotel .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\indian nude xxx catfight feet .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-update-upshared_31bf3856ad364e35_10.0.19041.1151_none_025296d718a7b3a8\spanish hardcore masturbation cock .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\kicking sperm public cock hairy (Liz).mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\InputMethod\SHARED\brasilian nude sperm sleeping sm .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\SoftwareDistribution\Download\gay full movie wifey .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\hardcore masturbation bondage .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\nude lingerie hot (!) glans bedroom (Melissa).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\british lesbian voyeur young .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_887b2378b7b5651d\brasilian nude sperm licking glans (Kathrin,Jade).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedrealitysvc_31bf3856ad364e35_10.0.19041.746_none_822bf1ada1526fa8\cum horse lesbian .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\assembly\tmp\lesbian [free] cock .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black action bukkake lesbian hole .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\brasilian nude sperm licking girly .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\nude lesbian several models high heels (Kathrin,Sarah).mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\malaysia beast [milf] cock .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\sperm public wifey (Gina,Janette).zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\malaysia fucking lesbian redhair (Christine,Liz).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_14c898cc82025c76\chinese xxx lesbian wifey .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\trambling girls feet .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\assembly\temp\russian nude gay masturbation blondie (Anniston,Sylvia).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\brasilian horse lingerie [milf] feet sm .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\nude hardcore masturbation titts .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\african gay lesbian ash .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-t..ervices-tsfairshare_31bf3856ad364e35_10.0.19041.746_none_0b33a1c93a22de1c\russian gang bang gay [milf] titts traffic .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\tyrkish animal gay voyeur feet .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\fucking girls titts circumcision (Jade).zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\lingerie several models titts boots (Liz).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\german bukkake big penetration .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\american action fucking hidden glans ash .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_en-us_e5f85095c4bc5d16\swedish kicking horse [free] cock high heels .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..-kf-commondownloads_31bf3856ad364e35_10.0.19041.1_none_a914e3e3f19ceda1\swedish action blowjob several models young (Anniston,Sylvia).mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_3058d81cfd5218f2\horse sleeping stockings .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\swedish cumshot horse big cock .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\brasilian cumshot blowjob public hole .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\chinese gay licking granny .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\sperm big (Janette).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.207_none_e2f2dfeea7fa44fc\italian beastiality sperm hot (!) .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_de-de_e4e52f411b7b0526\japanese handjob beast masturbation stockings (Sandy,Janette).rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\french sperm uncut glans .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\brasilian beastiality blowjob several models .zip.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\malaysia lingerie several models (Jade).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_89c0bf1761110f07\tyrkish horse lingerie big mature .avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_734900fc110387b6\japanese handjob bukkake uncut hole black hairunshaved (Janette).mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..ell-sharedutilities_31bf3856ad364e35_10.0.19041.1_none_813610a8a9b59e0a\malaysia fucking full movie cock leather .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_netfx4-_dataperfcou.._shared12_neutral_h_b03f5f7f11d50a3a_4.0.15805.0_none_24ed4511dcc3019e\german fucking catfight cock .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\asian bukkake full movie high heels .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\norwegian blowjob [bangbus] (Liz).avi.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\swedish gang bang trambling [bangbus] hole granny .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\black action bukkake [milf] feet shoes (Tatjana).mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.867_none_c29826784f9429f8\beastiality lingerie [bangbus] feet circumcision .mpg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_en-us_bfae5918c0443f83\horse hardcore full movie YEâPSè& .rar.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\brasilian action trambling hot (!) stockings .mpeg.exe 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4072 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 1948 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4652 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 91 PID 3452 wrote to memory of 4652 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 91 PID 3452 wrote to memory of 4652 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 91 PID 3452 wrote to memory of 1948 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 92 PID 3452 wrote to memory of 1948 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 92 PID 3452 wrote to memory of 1948 3452 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 92 PID 4652 wrote to memory of 4072 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 93 PID 4652 wrote to memory of 4072 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 93 PID 4652 wrote to memory of 4072 4652 937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"C:\Users\Admin\AppData\Local\Temp\937ad80886271c486905dccde62920627fdbf46faad21f33ea0ff404e1c5016f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\japanese fetish lesbian uncut cock .zip.exe
Filesize591KB
MD505a48a0743ea4526518a5bc977fd643e
SHA175ae797239da171603c89c0f3d6178cf50041341
SHA256e2d2040e6a71b2f6a1fb02f07c94d5e28a028752882a256c90af082e12fb0832
SHA51262c991347ec444539ed0d93af7b07ef6dbcf20d87cec95cdf8dde206aef683e9c7b1fbdae50e2e65bc443d78f3cdc092afa5a36bb442fa069f5740768a51703a