Analysis
-
max time kernel
107s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2022 21:08
Behavioral task
behavioral1
Sample
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe
Resource
win10v2004-20220812-en
General
-
Target
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe
-
Size
392KB
-
MD5
e93590ec419d167842a3c0c8532fa56e
-
SHA1
fbbd693044fa478a7e76def68c158bc5ba2b9054
-
SHA256
334f814c3b403562e5bd6cc66d2ace48d97e2e1bab309d9a15de29c26219371a
-
SHA512
ef9b10430e3093d64519091b9375d9d04af19a7d7361157cd484d315b3c75a4bf99a27f4ac2e2c8d0140e0ce0437a6b33556b52cce6b83bc132494142cb7a7f8
-
SSDEEP
6144:k9nZEPD78jA9aNGY9i81SV2K2d6Or989IwfvyvbAxXUtx/qVj:4Z+8d3S5ycUej
Malware Config
Extracted
privateloader
http://163.123.143.4/proxies.txt
http://107.182.129.251/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
163.123.143.12
http://91.241.19.125/pub.php?pub=one
http://sarfoods.com/index.php
-
payload_url
https://cdn.discordapp.com/attachments/1003879548242374749/1003976870611669043/NiceProcessX64.bmp
https://cdn.discordapp.com/attachments/1003879548242374749/1003976754358124554/NiceProcessX32.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931507465563045909/dingo_20220114120058.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://193.56.146.76/Proxytest.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://privacy-tools-for-you-780.com/downloads/toolspab3.exe
http://luminati-china.xyz/aman/casper2.exe
https://innovicservice.net/assets/vendor/counterup/RobCleanerInstlr95038215.exe
http://tg8.cllgxx.com/hp8/g1/yrpp1047.exe
https://cdn.discordapp.com/attachments/910842184708792331/930849718240698368/Roll.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930850766787330068/real1201.bmp
https://cdn.discordapp.com/attachments/910842184708792331/930882959131693096/Installer.bmp
http://185.215.113.208/ferrari.exe
https://cdn.discordapp.com/attachments/910842184708792331/931233371110141962/LingeringsAntiphon.bmp
https://cdn.discordapp.com/attachments/910842184708792331/931285223709225071/russ.bmp
https://cdn.discordapp.com/attachments/910842184708792331/932720393201016842/filinnn.bmp
https://cdn.discordapp.com/attachments/910842184708792331/933436611427979305/build20k.bmp
https://c.xyzgamec.com/userdown/2202/random.exe
http://mnbuiy.pw/adsli/note8876.exe
http://www.yzsyjyjh.com/askhelp23/askinstall23.exe
http://luminati-china.xyz/aman/casper2.exe
https://suprimax.vet.br/css/fonts/OneCleanerInst942914.exe
http://tg8.cllgxx.com/hp8/g1/ssaa1047.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_64_bit_4.3.0_Setup.exe
https://www.deezloader.app/files/Deezloader_Remix_Installer_32_bit_4.3.0_Setup.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516400005296219/anyname.exe
https://cdn.discordapp.com/attachments/910281601559167006/911516894660530226/PBsecond.exe
https://cdn.discordapp.com/attachments/910842184708792331/914047763304550410/Xpadder.bmp
Signatures
-
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Executes dropped EXE 1 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exepid process 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 16 ipinfo.io 17 ipinfo.io -
Drops file in Program Files directory 64 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI391D~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MIA062~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13165~1.21\MICROS~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~2.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Drops file in Windows directory 1 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process File opened for modification C:\Windows\svchost.com 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4000 3232 WerFault.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 4708 3232 WerFault.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Modifies registry class 1 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exepid process 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 3232 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exedescription pid process target process PID 2368 wrote to memory of 3232 2368 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe PID 2368 wrote to memory of 3232 2368 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe PID 2368 wrote to memory of 3232 2368 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe 334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe"C:\Users\Admin\AppData\Local\Temp\334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\334F814C3B403562E5BD6CC66D2ACE48D97E2E1BAB309.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 18203⤵
- Program crash
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 18123⤵
- Program crash
PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3232 -ip 32321⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3232 -ip 32321⤵PID:4644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515
-
Filesize
351KB
MD5312ad3b67a1f3a75637ea9297df1cedb
SHA17d922b102a52241d28f1451d3542db12b0265b75
SHA2563b4c1d0a112668872c1d4f9c9d76087a2afe7a8281a6cb6b972c95fb2f4eb28e
SHA512848db7d47dc37a9025e3df0dda4fbf1c84d9a9191febae38621d9c9b09342a987ff0587108cccfd874cb900c88c5f9f9ca0548f3027f6515ed85c92fd26f8515