Analysis
-
max time kernel
55s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/10/2022, 13:13
Static task
static1
Behavioral task
behavioral1
Sample
fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe
Resource
win10v2004-20220812-en
General
-
Target
fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe
-
Size
203KB
-
MD5
efffd808e7ef354e11773677eab1b799
-
SHA1
c2c2d82939c0b890a245ba11595a150e46005dad
-
SHA256
fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3
-
SHA512
e66e6219d72af4d42a6f7d0084a307fde3d2869392959928b8f65e8a537c71b707a27b082f4abef1e4707019aaa8489ca048ded464594099e3f736538414bdaf
-
SSDEEP
3072:HX1r2sLXqpE3sbC5kNpmHwBFa5A85dJKJB/EUhuE0KnOIcZWUuSC:3t2sLfMbN8H4roJCh10KOI4vuS
Malware Config
Extracted
redline
nam7
103.89.90.61:34589
-
auth_value
533c8fbdab4382453812c73ea2cee5b8
Extracted
redline
slovarik15btc
78.153.144.3:2510
-
auth_value
bfedad55292538ad3edd07ac95ad8952
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Extracted
vidar
55.2
1636
https://t.me/dghzq
https://t.me/zjsqpz
https://t.me/fqwexzq
-
profile_id
1636
Signatures
-
Detects Smokeloader packer 1 IoCs
resource yara_rule behavioral2/memory/4248-133-0x00000000005D0000-0x00000000005D9000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral2/memory/4648-140-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/4944-153-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral2/memory/4844-162-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 792 D6BD.exe 3476 F236.exe 4056 F4A8.exe 1984 FB8E.exe 2248 UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe 4280 9B8.exe 3536 LYKAA.exe 584 15B0.exe 3416 1BAC.exe 3980 57499904878336568975.exe -
resource yara_rule behavioral2/files/0x0007000000022e40-185.dat upx behavioral2/memory/4280-186-0x00007FF6C3420000-0x00007FF6C3C83000-memory.dmp upx behavioral2/memory/4280-234-0x00007FF6C3420000-0x00007FF6C3C83000-memory.dmp upx -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation FB8E.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation LYKAA.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1BAC.exe -
Loads dropped DLL 3 IoCs
pid Process 3416 1BAC.exe 3416 1BAC.exe 3416 1BAC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 792 set thread context of 4648 792 D6BD.exe 90 PID 3476 set thread context of 4944 3476 F236.exe 93 PID 4056 set thread context of 4844 4056 F4A8.exe 95 PID 3536 set thread context of 5112 3536 LYKAA.exe 113 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3924 3416 WerFault.exe 107 3876 584 WerFault.exe 106 4124 2368 WerFault.exe 129 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1BAC.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1BAC.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1176 timeout.exe 4676 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4248 fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe 4248 fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 Process not Found -
Suspicious behavior: MapViewOfSection 19 IoCs
pid Process 4248 fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found 3008 Process not Found -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeDebugPrivilege 2248 UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeDebugPrivilege 3536 LYKAA.exe Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeDebugPrivilege 4944 RegSvcs.exe Token: SeDebugPrivilege 4844 RegSvcs.exe Token: SeDebugPrivilege 584 15B0.exe Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeDebugPrivilege 4648 RegSvcs.exe Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found Token: SeShutdownPrivilege 3008 Process not Found Token: SeCreatePagefilePrivilege 3008 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 792 3008 Process not Found 89 PID 3008 wrote to memory of 792 3008 Process not Found 89 PID 3008 wrote to memory of 792 3008 Process not Found 89 PID 792 wrote to memory of 4648 792 D6BD.exe 90 PID 792 wrote to memory of 4648 792 D6BD.exe 90 PID 792 wrote to memory of 4648 792 D6BD.exe 90 PID 792 wrote to memory of 4648 792 D6BD.exe 90 PID 792 wrote to memory of 4648 792 D6BD.exe 90 PID 3008 wrote to memory of 3476 3008 Process not Found 92 PID 3008 wrote to memory of 3476 3008 Process not Found 92 PID 3008 wrote to memory of 3476 3008 Process not Found 92 PID 3476 wrote to memory of 4944 3476 F236.exe 93 PID 3476 wrote to memory of 4944 3476 F236.exe 93 PID 3476 wrote to memory of 4944 3476 F236.exe 93 PID 3476 wrote to memory of 4944 3476 F236.exe 93 PID 3476 wrote to memory of 4944 3476 F236.exe 93 PID 3008 wrote to memory of 4056 3008 Process not Found 94 PID 3008 wrote to memory of 4056 3008 Process not Found 94 PID 3008 wrote to memory of 4056 3008 Process not Found 94 PID 4056 wrote to memory of 4844 4056 F4A8.exe 95 PID 4056 wrote to memory of 4844 4056 F4A8.exe 95 PID 4056 wrote to memory of 4844 4056 F4A8.exe 95 PID 4056 wrote to memory of 4844 4056 F4A8.exe 95 PID 4056 wrote to memory of 4844 4056 F4A8.exe 95 PID 3008 wrote to memory of 1984 3008 Process not Found 96 PID 3008 wrote to memory of 1984 3008 Process not Found 96 PID 1984 wrote to memory of 2248 1984 FB8E.exe 97 PID 1984 wrote to memory of 2248 1984 FB8E.exe 97 PID 2248 wrote to memory of 4616 2248 UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe 98 PID 2248 wrote to memory of 4616 2248 UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe 98 PID 4616 wrote to memory of 1176 4616 cmd.exe 100 PID 4616 wrote to memory of 1176 4616 cmd.exe 100 PID 3008 wrote to memory of 4280 3008 Process not Found 101 PID 3008 wrote to memory of 4280 3008 Process not Found 101 PID 4616 wrote to memory of 3536 4616 cmd.exe 102 PID 4616 wrote to memory of 3536 4616 cmd.exe 102 PID 3536 wrote to memory of 2880 3536 LYKAA.exe 103 PID 3536 wrote to memory of 2880 3536 LYKAA.exe 103 PID 2880 wrote to memory of 5008 2880 cmd.exe 105 PID 2880 wrote to memory of 5008 2880 cmd.exe 105 PID 3008 wrote to memory of 584 3008 Process not Found 106 PID 3008 wrote to memory of 584 3008 Process not Found 106 PID 3008 wrote to memory of 584 3008 Process not Found 106 PID 3008 wrote to memory of 3416 3008 Process not Found 107 PID 3008 wrote to memory of 3416 3008 Process not Found 107 PID 3008 wrote to memory of 3416 3008 Process not Found 107 PID 3008 wrote to memory of 2188 3008 Process not Found 108 PID 3008 wrote to memory of 2188 3008 Process not Found 108 PID 3008 wrote to memory of 2188 3008 Process not Found 108 PID 3008 wrote to memory of 2188 3008 Process not Found 108 PID 3008 wrote to memory of 1924 3008 Process not Found 109 PID 3008 wrote to memory of 1924 3008 Process not Found 109 PID 3008 wrote to memory of 1924 3008 Process not Found 109 PID 3008 wrote to memory of 3276 3008 Process not Found 110 PID 3008 wrote to memory of 3276 3008 Process not Found 110 PID 3008 wrote to memory of 3276 3008 Process not Found 110 PID 3008 wrote to memory of 3276 3008 Process not Found 110 PID 3008 wrote to memory of 2220 3008 Process not Found 111 PID 3008 wrote to memory of 2220 3008 Process not Found 111 PID 3008 wrote to memory of 2220 3008 Process not Found 111 PID 3008 wrote to memory of 3700 3008 Process not Found 112 PID 3008 wrote to memory of 3700 3008 Process not Found 112 PID 3008 wrote to memory of 3700 3008 Process not Found 112 PID 3008 wrote to memory of 3700 3008 Process not Found 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe"C:\Users\Admin\AppData\Local\Temp\fff8cc0fd8c2d73ec312ab1cf0b8514ac725f0040f481a1dbe6cefe3353550b3.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4248
-
C:\Users\Admin\AppData\Local\Temp\D6BD.exeC:\Users\Admin\AppData\Local\Temp\D6BD.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Users\Admin\AppData\Local\Temp\F236.exeC:\Users\Admin\AppData\Local\Temp\F236.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\F4A8.exeC:\Users\Admin\AppData\Local\Temp\F4A8.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\FB8E.exeC:\Users\Admin\AppData\Local\Temp\FB8E.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe"C:\Users\Admin\AppData\Roaming\UbcHhFhbkSBskFSBEsBKFCAcShcFskcBfCACcHFHAHCABBBCFCAHHbF.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp129.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1176
-
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"6⤵
- Creates scheduled task(s)
PID:5008
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe -a verus -o stratum+tcp://na.luckpool.net:3956 -u RKsS6XcgidDNc8rU38Yiv5STQutyMUu9A4.test -p x -t 55⤵PID:5112
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:3272
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\9B8.exeC:\Users\Admin\AppData\Local\Temp\9B8.exe1⤵
- Executes dropped EXE
PID:4280 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell "" "Get-WmiObject Win32_PortConnector"2⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Temp\15B0.exeC:\Users\Admin\AppData\Local\Temp\15B0.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 16522⤵
- Program crash
PID:3876
-
-
C:\Users\Admin\AppData\Local\Temp\1BAC.exeC:\Users\Admin\AppData\Local\Temp\1BAC.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Checks processor information in registry
PID:3416 -
C:\ProgramData\57499904878336568975.exe"C:\ProgramData\57499904878336568975.exe"2⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2284
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"4⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 805⤵
- Program crash
PID:4124
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1BAC.exe" & exit2⤵PID:5092
-
C:\Windows\SysWOW64\timeout.exetimeout /t 63⤵
- Delays execution with timeout.exe
PID:4676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3416 -s 19482⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:2188
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1924
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3276
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:2220
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:3700
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1468
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:1812
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:4912
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵PID:4544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3416 -ip 34161⤵PID:2196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 584 -ip 5841⤵PID:4624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2368 -ip 23681⤵PID:3920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5340822180b4caf3a92d1b91c5c6e6a74
SHA1d8f3688a59dc4cbf7f1d8813165319b21b8c88c7
SHA25625613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc
SHA512b5daec4e4582b6678ca013fb3b2283732ffe9eab09e7601da7d6b427949dc90b71fb83c605acb88750fd5b392602216a6622cffbd5f4fbc627d44ca6df505f6c
-
Filesize
1.1MB
MD5340822180b4caf3a92d1b91c5c6e6a74
SHA1d8f3688a59dc4cbf7f1d8813165319b21b8c88c7
SHA25625613a9993c484dc8dd00937e0487299cc454e786eabd10cbf1a390a6ffdf0dc
SHA512b5daec4e4582b6678ca013fb3b2283732ffe9eab09e7601da7d6b427949dc90b71fb83c605acb88750fd5b392602216a6622cffbd5f4fbc627d44ca6df505f6c
-
Filesize
836KB
MD56bfb71e4fc04d577aeba46eb3412b4fa
SHA121a79a3829d6ffde7ce09e8ee237ec76b2f981ac
SHA25634ef414650a9bff1205c4483b8f87f887c9f7f133df4ed65ffda04426c0473d0
SHA5125d536aa610b50dc5e28a855b03d0dffeff618ba5f33fc021c5651b5eec4f85783bcab08157bbc587224a867c22aa36bb11d3d07fc1a73c46b264d9c46c41a6be
-
Filesize
836KB
MD56bfb71e4fc04d577aeba46eb3412b4fa
SHA121a79a3829d6ffde7ce09e8ee237ec76b2f981ac
SHA25634ef414650a9bff1205c4483b8f87f887c9f7f133df4ed65ffda04426c0473d0
SHA5125d536aa610b50dc5e28a855b03d0dffeff618ba5f33fc021c5651b5eec4f85783bcab08157bbc587224a867c22aa36bb11d3d07fc1a73c46b264d9c46c41a6be
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
Filesize
2KB
MD509f87ebf033076d4019bf0a9ee1eb2e9
SHA1b6f912c024056fd8b8353010f948dcbf3836e54a
SHA256e9328bdf85ab57bacc3b598afe0f3f5da4bab5fbe43f60a8e11df110ecbb949a
SHA512c7fd8c5b4a770a85c96da0b4dda5953398456f0d5ed9164b0d795835b338e6e5bb194dbfdde25372813e651730da3ccbd4eacd18f9a8524aa804209fb38d5618
-
Filesize
322KB
MD523e7783e3c2fc670b67a6c2e3adfbddd
SHA15e80033559948c206d0dad580805eeede6705c2d
SHA2560080bf59339551978336e60d9052ca6d465a9edde15f5cfb1e18e6e30b51bb2c
SHA5122bbc631de3d9bef155df0be3cd2390e2080544de7bd93005ad991dab8d69f9f2769e804b4908e3ff917fa677172b5d06d7925d50d4bcd33223e29267c6ba52c0
-
Filesize
322KB
MD523e7783e3c2fc670b67a6c2e3adfbddd
SHA15e80033559948c206d0dad580805eeede6705c2d
SHA2560080bf59339551978336e60d9052ca6d465a9edde15f5cfb1e18e6e30b51bb2c
SHA5122bbc631de3d9bef155df0be3cd2390e2080544de7bd93005ad991dab8d69f9f2769e804b4908e3ff917fa677172b5d06d7925d50d4bcd33223e29267c6ba52c0
-
Filesize
325KB
MD53469e23863fb33a72848f3d8a69a291c
SHA1a7759d184f5ce98dd367841c09d42ae41822d5ce
SHA256c3d2d34e51ae71bd982d822da876b4d72e5a7181d7cdc335ca62a67fc085d9d5
SHA512f81f0423210c1ba656b34358a17495bb6adc31cc00b2fe9e8c50c57c91914aa8037873802f70de5e9e62d2542f2b7dcbef08c1d8ee66db06b5e7eb8e06fb602b
-
Filesize
325KB
MD53469e23863fb33a72848f3d8a69a291c
SHA1a7759d184f5ce98dd367841c09d42ae41822d5ce
SHA256c3d2d34e51ae71bd982d822da876b4d72e5a7181d7cdc335ca62a67fc085d9d5
SHA512f81f0423210c1ba656b34358a17495bb6adc31cc00b2fe9e8c50c57c91914aa8037873802f70de5e9e62d2542f2b7dcbef08c1d8ee66db06b5e7eb8e06fb602b
-
Filesize
2.6MB
MD5701b03f316f1906936a7882afb8e93c6
SHA1305c0d52f4e83661d604c01ee1a0171b2532b380
SHA256b4c758e51a6f76ed43e0219aac7367af7d7b54c12130a39fdad3caa1f402d675
SHA51208fcd469bc2ca2ca83d27ce17e7eb2852d5bfa3bd7a7e4183bb0789915f15f1ba056cd2b12d3aaf72035ffe0af0198ef5dea86d1dd9412cb3f9ec8e07890cef6
-
Filesize
341KB
MD5111bdc8e1ea95e11693685d95e0b38ae
SHA144641e14986a285aec6fefd311772455f35bbd8a
SHA2561216269d6d279f2cd48c5402136b7a8fec0e9d8c7ec238066cc43eacb8659c6b
SHA5125bc4a6e8ac072be87dec7611665ee58093b7bd30f79b6e9468f7291d24708cdaaad8a8eac7034dc388cb6dcbada928a8799a8c0ee1043fb5b86d60eba95a8a14
-
Filesize
341KB
MD5111bdc8e1ea95e11693685d95e0b38ae
SHA144641e14986a285aec6fefd311772455f35bbd8a
SHA2561216269d6d279f2cd48c5402136b7a8fec0e9d8c7ec238066cc43eacb8659c6b
SHA5125bc4a6e8ac072be87dec7611665ee58093b7bd30f79b6e9468f7291d24708cdaaad8a8eac7034dc388cb6dcbada928a8799a8c0ee1043fb5b86d60eba95a8a14
-
Filesize
341KB
MD59a0848bc30964d727c91ce530fb34814
SHA124e2ff988d1f031f2471c5244fab71fe7c6e0fb1
SHA2561b0fbbcccd34a64180c3ce9cf864e36452384c27d3f4277b97918d311a3ded2f
SHA512d9567934e36da68a02a7cefabea53be74a94f442f6cce2362a1bc8ac889c0d11ca45163efac93b016f0feb218b45b49275a791a5321743bc53291ba74e5a6a8e
-
Filesize
341KB
MD59a0848bc30964d727c91ce530fb34814
SHA124e2ff988d1f031f2471c5244fab71fe7c6e0fb1
SHA2561b0fbbcccd34a64180c3ce9cf864e36452384c27d3f4277b97918d311a3ded2f
SHA512d9567934e36da68a02a7cefabea53be74a94f442f6cce2362a1bc8ac889c0d11ca45163efac93b016f0feb218b45b49275a791a5321743bc53291ba74e5a6a8e
-
Filesize
341KB
MD5a4a99a8c416d8f2a20315563be1d3154
SHA1d66fda2294cbcd338f80617bc48fbdd28b934bbe
SHA256e952f08addf604f336ecd6eeb7dda7658f7ed3cc53084d2d9ac630302968ef81
SHA512d7e090f59595bbd53371efaa033bb29f8be4c207d4cd1cc7caa6f8f206b67bc39c7051bf04698f7db914f0eb721ce7ff30fa874c8729b47c5e7a8439972bbd2f
-
Filesize
341KB
MD5a4a99a8c416d8f2a20315563be1d3154
SHA1d66fda2294cbcd338f80617bc48fbdd28b934bbe
SHA256e952f08addf604f336ecd6eeb7dda7658f7ed3cc53084d2d9ac630302968ef81
SHA512d7e090f59595bbd53371efaa033bb29f8be4c207d4cd1cc7caa6f8f206b67bc39c7051bf04698f7db914f0eb721ce7ff30fa874c8729b47c5e7a8439972bbd2f
-
Filesize
1.1MB
MD5de13415883a0ce890e192af659fcf88e
SHA129e798a45ef4b766de0ad2bbc69a869779b0be1d
SHA256be73afa7a9b39a447b38dc20b76017742364402e4dcaf629a014a694ed202d6a
SHA51287e90bec47ccfd69008e656c53ed29ae9a7da98a13f4f51584f186f3b3c1d1406296059b8f5e8873800d2293e7f2034b8f7261bf7751653fd68174c928c32a9b
-
Filesize
1.1MB
MD5de13415883a0ce890e192af659fcf88e
SHA129e798a45ef4b766de0ad2bbc69a869779b0be1d
SHA256be73afa7a9b39a447b38dc20b76017742364402e4dcaf629a014a694ed202d6a
SHA51287e90bec47ccfd69008e656c53ed29ae9a7da98a13f4f51584f186f3b3c1d1406296059b8f5e8873800d2293e7f2034b8f7261bf7751653fd68174c928c32a9b
-
Filesize
152B
MD50685d2adf1968abbe5d998ca5ed1fb94
SHA144fa1ff1015aeb28a6bd1cdfbf422729efcc1967
SHA256f83c8c7e66e83983bf900d0c5510f0842cc7f7263594fc7cc149e23e1a76487e
SHA512ca5dadff9357dc5d86ba73dd6910fbe8ef2ffe827b1a39874dff3975c475aa7d791e20fb68a0f079bc0d6377229e025ca81bb64fe8a7e3a27c047730d821da0e
-
Filesize
836KB
MD56bfb71e4fc04d577aeba46eb3412b4fa
SHA121a79a3829d6ffde7ce09e8ee237ec76b2f981ac
SHA25634ef414650a9bff1205c4483b8f87f887c9f7f133df4ed65ffda04426c0473d0
SHA5125d536aa610b50dc5e28a855b03d0dffeff618ba5f33fc021c5651b5eec4f85783bcab08157bbc587224a867c22aa36bb11d3d07fc1a73c46b264d9c46c41a6be
-
Filesize
836KB
MD56bfb71e4fc04d577aeba46eb3412b4fa
SHA121a79a3829d6ffde7ce09e8ee237ec76b2f981ac
SHA25634ef414650a9bff1205c4483b8f87f887c9f7f133df4ed65ffda04426c0473d0
SHA5125d536aa610b50dc5e28a855b03d0dffeff618ba5f33fc021c5651b5eec4f85783bcab08157bbc587224a867c22aa36bb11d3d07fc1a73c46b264d9c46c41a6be