Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2022, 20:01
Static task
static1
General
-
Target
1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe
-
Size
5.6MB
-
MD5
874e46be108952c842a12c0e19a64f34
-
SHA1
7ca7e05b6c79bb32b2278b2a688b062fa94c3307
-
SHA256
1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe
-
SHA512
e3f22582d592ce8791de1825abf30fbcfa209685ed07b38c390ac2e6b9a0ba8314c1b8377c6c02413b90b68abd2949a29163a570ee5da8a7b9139f37b25a56e3
-
SSDEEP
98304:oQIKTOArAetVg4jpptVbo5BkrTWZ5OHqY5n95WXDJsks6ofoGvB7wMX5E6p:oQIIOAjg4NptgyWZ5OTD5Etsl1vpwUEU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 Sppyteaet.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1496 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 488 set thread context of 4368 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4372 488 WerFault.exe 77 2328 1496 WerFault.exe 91 -
Checks processor information in registry 2 TTPs 43 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4368 rundll32.exe 4368 rundll32.exe 1540 chrome.exe 1540 chrome.exe 1496 chrome.exe 1496 chrome.exe 4980 chrome.exe 4980 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2256 Sppyteaet.exe Token: SeDebugPrivilege 4368 rundll32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2256 Sppyteaet.exe 4368 rundll32.exe 1496 chrome.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2256 Sppyteaet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1496 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 488 wrote to memory of 2256 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 80 PID 488 wrote to memory of 2256 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 80 PID 488 wrote to memory of 2256 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 80 PID 488 wrote to memory of 4368 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 83 PID 488 wrote to memory of 4368 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 83 PID 488 wrote to memory of 4368 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 83 PID 488 wrote to memory of 4368 488 1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe 83 PID 1496 wrote to memory of 1908 1496 chrome.exe 92 PID 1496 wrote to memory of 1908 1496 chrome.exe 92 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 3148 1496 chrome.exe 95 PID 1496 wrote to memory of 1540 1496 chrome.exe 96 PID 1496 wrote to memory of 1540 1496 chrome.exe 96 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97 PID 1496 wrote to memory of 2948 1496 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe"C:\Users\Admin\AppData\Local\Temp\1432e3b4ae9324a1ed25bcab0beb43dc361abdae4d622239f66c70ecbd469afe.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe"C:\Users\Admin\AppData\Local\Temp\Sppyteaet.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2256
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 14362⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 488 -ip 4881⤵PID:1868
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --silent-launch --disable-backgrounding-occluded-windows --disable-background-timer-throttling --ran-launcher --profile-directory="Default"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87d884f50,0x7ff87d884f60,0x7ff87d884f702⤵PID:1908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1700 /prefetch:22⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 /prefetch:82⤵PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3788 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3824 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3996 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1664,940868622621625841,14648485487021453654,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4068 /prefetch:82⤵PID:4432
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1496 -s 41802⤵
- Program crash
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 1496 -ip 14961⤵PID:4188
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5ff6a5732355485b459248f586c2b6945
SHA107da3f03ef18e2eaddfceb050b68e93fd533f7a3
SHA256366ee3319c995b995fcfcc3f2228a18a09d0461a94964b4b4ad9a89dcbf669f4
SHA512379fd03ebec85a9b15caf0aa8ba5a43c76199391ba3a2b29d20426501294e66d8f07c219e05355b47702e5a836d1a89015533f72da6bbe2ded57ee5d24056749
-
Filesize
1.3MB
MD5ff6a5732355485b459248f586c2b6945
SHA107da3f03ef18e2eaddfceb050b68e93fd533f7a3
SHA256366ee3319c995b995fcfcc3f2228a18a09d0461a94964b4b4ad9a89dcbf669f4
SHA512379fd03ebec85a9b15caf0aa8ba5a43c76199391ba3a2b29d20426501294e66d8f07c219e05355b47702e5a836d1a89015533f72da6bbe2ded57ee5d24056749