Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 22:13
Behavioral task
behavioral1
Sample
37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe
Resource
win10v2004-20240419-en
General
-
Target
37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe
-
Size
1.4MB
-
MD5
f86dfe49246ec4c255dcae40f178de17
-
SHA1
284dd1cc6f87daff074da00095c3a6e740cdef6c
-
SHA256
37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5
-
SHA512
54e86adf177e9c8da0181f80b4592d3ea1261cff3e2b4df7b410c8263439f42126195650f789e67f109c990ca946ff9a9d2e5b449c5b45d81801810a1f35da69
-
SSDEEP
24576:ZC8BQ4IIXhUEsDUc6tUxkZMleYVP1QtkjPLLYNUDJ0BrQ3RTBIFnc882p7eb+ntM:QF4/Xhn1m8YVP7DLYNUl0C3viJtp7U+K
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 20 IoCs
resource yara_rule behavioral2/memory/3308-26-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3712-151-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-178-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3308-179-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/3712-180-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/1172-181-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-183-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-184-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-190-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-200-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-204-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-209-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-213-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-217-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-221-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-225-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-229-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-233-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-237-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames behavioral2/memory/2932-241-0x0000000000400000-0x000000000041D000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
UPX dump on OEP (original entry point) 23 IoCs
resource yara_rule behavioral2/memory/2932-0-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/files/0x0012000000023a49-5.dat UPX behavioral2/memory/3308-26-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3712-151-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1172-152-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-178-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3308-179-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/3712-180-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/1172-181-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-183-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-184-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-190-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-200-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-204-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-209-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-213-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-217-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-221-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-225-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-229-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-233-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-237-0x0000000000400000-0x000000000041D000-memory.dmp UPX behavioral2/memory/2932-241-0x0000000000400000-0x000000000041D000-memory.dmp UPX -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe Key value queried \REGISTRY\USER\S-1-5-21-2818691465-3043947619-2475182763-1000\Control Panel\International\Geo\Nation 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2932-0-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/files/0x0012000000023a49-5.dat upx behavioral2/memory/3308-26-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3712-151-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1172-152-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-178-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3308-179-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/3712-180-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/1172-181-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-183-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-184-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-190-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-200-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-204-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-209-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-213-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-217-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-221-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-229-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-233-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-237-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/2932-241-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\S: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\U: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\Y: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\H: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\I: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\M: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\N: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\Q: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\V: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\W: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\X: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\A: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\E: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\J: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\T: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\B: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\K: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\P: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\Z: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\G: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\L: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File opened (read-only) \??\O: 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\tyrkish cum horse public .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\FxsTmp\lingerie hidden glans .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\IME\SHARED\bukkake several models hole traffic (Sarah).mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang blowjob public granny .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\IME\SHARED\american action gay masturbation wifey .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\black fetish sperm [milf] cock YEâPSè& .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\cum bukkake voyeur .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\indian cumshot blowjob catfight sm (Sonja,Karin).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\config\systemprofile\hardcore uncut ash .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\System32\DriverStore\Temp\beast sleeping (Melissa).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\blowjob voyeur .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian action gay several models .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\Microsoft Shared\brasilian cumshot hardcore hot (!) hole .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Common Files\microsoft shared\italian action lesbian girls (Sylvia).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\dotnet\shared\italian handjob lesbian masturbation titts 40+ .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\root\Templates\american beastiality lesbian uncut mature .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\japanese cumshot sperm masturbation cock high heels (Liz).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\Updates\Download\japanese animal bukkake licking .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\japanese animal fucking hidden titts .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\bukkake [free] (Samantha).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Google\Update\Download\tyrkish nude fucking [free] feet .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\indian beastiality horse public titts castration (Janette).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Google\Temp\lingerie licking (Curtney).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\italian horse trambling licking cock .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Microsoft\Temp\italian horse beast public (Melissa).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\black kicking lesbian [milf] hole shower (Sarah).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\gay masturbation titts .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\black porn fucking [bangbus] femdom .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Microsoft\Temp\EU9848.tmp\blowjob several models femdom .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\italian cumshot trambling uncut feet traffic .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\horse sleeping glans .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\security\templates\russian horse fucking uncut young .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedfoldersui_31bf3856ad364e35_10.0.19041.1_none_7862ecae0548fb54\chinese lesbian sleeping shoes .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\spanish lingerie public cock bedroom .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_netfx-shared_netfx_20_mscorwks_31bf3856ad364e35_10.0.19041.1_none_359f84f8e5af60e2\hardcore lesbian titts .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_netfx-shared_registry_whidbey_31bf3856ad364e35_10.0.19041.1_none_1c68775f06732f08\cum horse several models (Jade).zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\japanese kicking beast voyeur cock gorgeoushorny .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\brasilian kicking gay [milf] upskirt .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\canadian trambling hidden feet ejaculation (Sarah).zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\indian gang bang gay sleeping glans circumcision .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\fetish lesbian licking hole blondie (Liz).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_f8d34ba1b1eb00de\asian trambling sleeping 50+ .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\fucking voyeur balls .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\handjob hardcore full movie girly .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\InputMethod\SHARED\danish fetish hardcore hot (!) feet (Sonja,Sarah).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\chinese lingerie public cock girly (Sarah).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_netfx4-uninstallsqlstatetemplate_sql_b03f5f7f11d50a3a_4.0.15805.0_none_db70a8ec1b999dd5\swedish fetish trambling hidden lady (Gina,Liz).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\Temp\russian animal sperm hidden stockings .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_965fbcbe4df0916b\african blowjob voyeur glans .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\x86_netfx-shared_netfx_20_mscorlib_b03f5f7f11d50a3a_10.0.19041.1_none_15ba23b7f1e2b81b\asian sperm [bangbus] (Janette).zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\mssrv.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\lingerie full movie glans boots .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\swedish handjob gay girls (Janette).mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\action trambling licking .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\gang bang fucking [milf] feet lady (Jade).mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p2p-pnrp-adm.resources_31bf3856ad364e35_10.0.19041.1_de-de_3d077a9cd5de5151\danish animal lesbian full movie mistress (Jenna,Sarah).zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\american fetish xxx voyeur ejaculation .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\brasilian kicking beast uncut hole .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\x86_microsoft.grouppolicy.admtmpleditor_31bf3856ad364e35_10.0.19041.1_none_34e3bab50607a64b\beast [milf] hole penetration (Tatjana).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\hardcore [bangbus] YEâPSè& .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\american handjob xxx hot (!) redhair .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-systempropertiesremote_31bf3856ad364e35_10.0.19041.1_none_4ac6500cab2b2113\porn sperm [milf] bedroom (Sonja,Sarah).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_netfx-aspnet-nonwow64-shared_b03f5f7f11d50a3a_4.0.19041.1_none_d66d07dacac85e2d\german lesbian [bangbus] cock .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\msil_microsoft.powershel..filedownloadmanager_31bf3856ad364e35_10.0.19041.1_none_cb69bad627df9263\lesbian uncut pregnant .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-security-ntlmshared_31bf3856ad364e35_10.0.19041.1_none_7d9dab4e456449b1\italian nude bukkake sleeping hole .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-sharedaccess_31bf3856ad364e35_10.0.19041.1_none_c513167c1d0a90dd\danish cumshot beast full movie 40+ (Kathrin,Tatjana).zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\Downloaded Program Files\japanese cum horse voyeur glans .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\trambling voyeur glans (Sonja,Melissa).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\action beast sleeping titts hotel (Jade).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\norwegian lingerie big beautyfull .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\french beast several models hole bondage .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\russian gang bang xxx voyeur shower .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\horse hardcore uncut hole .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\malaysia lesbian big .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1_none_97e9c0335b4cd39a\lesbian voyeur titts .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedfolders-adm_31bf3856ad364e35_10.0.19041.1_none_096bb4dc0d5d63a0\indian cumshot horse [milf] glans .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\assembly\temp\xxx girls (Melissa).rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\tyrkish porn lingerie licking blondie (Anniston,Jade).mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\russian beastiality lingerie uncut cock .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\xxx catfight glans .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-u..tyvm-sysprep-shared_31bf3856ad364e35_10.0.19041.1_none_3ba048793ab5eb3f\lesbian masturbation hole .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\hardcore licking cock .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-s..mon-sharedresources_31bf3856ad364e35_10.0.19041.1_none_5417ea1f38dbb76b\cum sperm licking titts .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_de-de_bc04d4fbcc35e12a\spanish sperm several models (Janette).mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-sharedaccess.resources_31bf3856ad364e35_10.0.19041.1_en-us_64f5aaf4bb13ecef\kicking lingerie girls .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-w..templates.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_bca64d70c79f104b\animal beast [free] redhair .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\CbsTemp\indian handjob sperm hot (!) fishy (Jenna,Samantha).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\PLA\Templates\swedish cumshot hardcore voyeur hole stockings .rar.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\russian action bukkake hidden 50+ .zip.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\fucking catfight penetration (Gina,Sylvia).avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\tyrkish action sperm [bangbus] hole boots .mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\british lesbian girls .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\italian cum beast [bangbus] titts .avi.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\InstallTemp\animal fucking uncut hole ejaculation (Janette).mpeg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe File created C:\Windows\WinSxS\wow64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_b201c2e68d8dbc0d\horse sleeping mature .mpg.exe 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 1172 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 3712 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2932 wrote to memory of 3308 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 87 PID 2932 wrote to memory of 3308 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 87 PID 2932 wrote to memory of 3308 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 87 PID 2932 wrote to memory of 3712 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 93 PID 2932 wrote to memory of 3712 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 93 PID 2932 wrote to memory of 3712 2932 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 93 PID 3308 wrote to memory of 1172 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 94 PID 3308 wrote to memory of 1172 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 94 PID 3308 wrote to memory of 1172 3308 37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"C:\Users\Admin\AppData\Local\Temp\37c88808b60e908b789196d243a1f9b96472e1ebc915cb2753ad767b1be191a5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\black kicking lesbian [milf] hole shower (Sarah).rar.exe
Filesize277KB
MD527edf74842d5584f6c35c2601ebd68d0
SHA1d56534094bb3bfa23ad6eb4ac870010c1beb5a65
SHA256301d01fca7eeda492cb6437a8ad014da9f0214d032e8240b9aea10ba57e5ed6f
SHA512858302d349c4a4953f6cdd8a0dfbe84a02d6fb862b66ff51f0bb8d8f6039b0b07c61887c00547e54a830b20de27818071d78cf47345ccca7c17614bbc541f2b3