Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 22:31
Static task
static1
General
-
Target
fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe
-
Size
962KB
-
MD5
6a65116a7d361dd115750ca177ae157c
-
SHA1
c070f4f705823e376af95b8a973282c429ed69a1
-
SHA256
fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7
-
SHA512
4a770bbfc14dbc463dc9504eee3fec27bcb2ceed2e145a72f2d219027d1aa1269fa9c0fd5d6c3f027d40862e277c4c7aaa950bc438621de50dd31dad71083c59
-
SSDEEP
24576:nyuyCx4LEznhbGujkXLoiyelCFOMK7qbaaJ2GitQw1Ss:yuyCkEznhbGuQXLjyeRM5aaITy
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it382225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it382225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it382225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it382225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it382225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it382225.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr769415.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr810218.exe -
Executes dropped EXE 10 IoCs
pid Process 5116 ziZT9421.exe 1704 zial5173.exe 4412 it382225.exe 1876 jr810218.exe 1580 1.exe 2832 kp876754.exe 3840 lr769415.exe 2384 oneetx.exe 760 oneetx.exe 4456 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2992 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it382225.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziZT9421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZT9421.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zial5173.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zial5173.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 4416 1876 WerFault.exe 89 1512 3840 WerFault.exe 96 3836 3840 WerFault.exe 96 2556 3840 WerFault.exe 96 1816 3840 WerFault.exe 96 4688 3840 WerFault.exe 96 2332 3840 WerFault.exe 96 4412 3840 WerFault.exe 96 2184 3840 WerFault.exe 96 3484 3840 WerFault.exe 96 3740 3840 WerFault.exe 96 2268 2384 WerFault.exe 115 4372 2384 WerFault.exe 115 3096 2384 WerFault.exe 115 324 2384 WerFault.exe 115 1324 2384 WerFault.exe 115 404 2384 WerFault.exe 115 2420 2384 WerFault.exe 115 3032 2384 WerFault.exe 115 4168 2384 WerFault.exe 115 4360 2384 WerFault.exe 115 5076 2384 WerFault.exe 115 4944 760 WerFault.exe 142 2416 2384 WerFault.exe 115 2412 2384 WerFault.exe 115 3536 2384 WerFault.exe 115 2156 4456 WerFault.exe 152 5116 2384 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2768 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4412 it382225.exe 4412 it382225.exe 1580 1.exe 2832 kp876754.exe 2832 kp876754.exe 1580 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4412 it382225.exe Token: SeDebugPrivilege 1876 jr810218.exe Token: SeDebugPrivilege 1580 1.exe Token: SeDebugPrivilege 2832 kp876754.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3840 lr769415.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4940 wrote to memory of 5116 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 84 PID 4940 wrote to memory of 5116 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 84 PID 4940 wrote to memory of 5116 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 84 PID 5116 wrote to memory of 1704 5116 ziZT9421.exe 85 PID 5116 wrote to memory of 1704 5116 ziZT9421.exe 85 PID 5116 wrote to memory of 1704 5116 ziZT9421.exe 85 PID 1704 wrote to memory of 4412 1704 zial5173.exe 86 PID 1704 wrote to memory of 4412 1704 zial5173.exe 86 PID 1704 wrote to memory of 1876 1704 zial5173.exe 89 PID 1704 wrote to memory of 1876 1704 zial5173.exe 89 PID 1704 wrote to memory of 1876 1704 zial5173.exe 89 PID 1876 wrote to memory of 1580 1876 jr810218.exe 91 PID 1876 wrote to memory of 1580 1876 jr810218.exe 91 PID 1876 wrote to memory of 1580 1876 jr810218.exe 91 PID 5116 wrote to memory of 2832 5116 ziZT9421.exe 95 PID 5116 wrote to memory of 2832 5116 ziZT9421.exe 95 PID 5116 wrote to memory of 2832 5116 ziZT9421.exe 95 PID 4940 wrote to memory of 3840 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 96 PID 4940 wrote to memory of 3840 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 96 PID 4940 wrote to memory of 3840 4940 fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe 96 PID 3840 wrote to memory of 2384 3840 lr769415.exe 115 PID 3840 wrote to memory of 2384 3840 lr769415.exe 115 PID 3840 wrote to memory of 2384 3840 lr769415.exe 115 PID 2384 wrote to memory of 2768 2384 oneetx.exe 132 PID 2384 wrote to memory of 2768 2384 oneetx.exe 132 PID 2384 wrote to memory of 2768 2384 oneetx.exe 132 PID 2384 wrote to memory of 2992 2384 oneetx.exe 149 PID 2384 wrote to memory of 2992 2384 oneetx.exe 149 PID 2384 wrote to memory of 2992 2384 oneetx.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe"C:\Users\Admin\AppData\Local\Temp\fae9725ed8c1e87b40b832e6856cd9f2a2990a53329b6f44ae80a9ac99799dd7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZT9421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZT9421.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zial5173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zial5173.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it382225.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it382225.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr810218.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr810218.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 13765⤵
- Program crash
PID:4416
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp876754.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr769415.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 6963⤵
- Program crash
PID:1512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 7483⤵
- Program crash
PID:3836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 7963⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 9723⤵
- Program crash
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 10083⤵
- Program crash
PID:4688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 9683⤵
- Program crash
PID:2332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 12203⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 12323⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 13163⤵
- Program crash
PID:3484
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 6924⤵
- Program crash
PID:2268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8444⤵
- Program crash
PID:4372
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 8924⤵
- Program crash
PID:3096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 10524⤵
- Program crash
PID:324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 10724⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11244⤵
- Program crash
PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11324⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 9924⤵
- Program crash
PID:3032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 6924⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 9884⤵
- Program crash
PID:4360
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 12004⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 11084⤵
- Program crash
PID:2416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 16124⤵
- Program crash
PID:2412
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 10964⤵
- Program crash
PID:3536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 16284⤵
- Program crash
PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 13483⤵
- Program crash
PID:3740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1876 -ip 18761⤵PID:4072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3840 -ip 38401⤵PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3840 -ip 38401⤵PID:1620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3840 -ip 38401⤵PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3840 -ip 38401⤵PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3840 -ip 38401⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3840 -ip 38401⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3840 -ip 38401⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3840 -ip 38401⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3840 -ip 38401⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 3840 -ip 38401⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2384 -ip 23841⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2384 -ip 23841⤵PID:4652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2384 -ip 23841⤵PID:2812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2384 -ip 23841⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2384 -ip 23841⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2384 -ip 23841⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2384 -ip 23841⤵PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2384 -ip 23841⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2384 -ip 23841⤵PID:4748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2384 -ip 23841⤵PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2384 -ip 23841⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 760 -s 3162⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 760 -ip 7601⤵PID:2720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2384 -ip 23841⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2384 -ip 23841⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2384 -ip 23841⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 3122⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4456 -ip 44561⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2384 -ip 23841⤵PID:1576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
679KB
MD58973ec083735a45792619d53a53b2906
SHA1cd95e2eccf1e36fbe02b2b724b2bd9fde164eea0
SHA256287d8f8a7d43ad564e70420990c88d8b74affc8961aac7c7a09485d6f7891d2c
SHA512524a3fdda8bdbea063c99914007d7fdb7746b6a9e1a32820b1b22a8b9e2eb985f8aef0ab5f6305bae5fba9b6bb9af6ea85be4d87ff2a70819fb4193a65cf8595
-
Filesize
679KB
MD58973ec083735a45792619d53a53b2906
SHA1cd95e2eccf1e36fbe02b2b724b2bd9fde164eea0
SHA256287d8f8a7d43ad564e70420990c88d8b74affc8961aac7c7a09485d6f7891d2c
SHA512524a3fdda8bdbea063c99914007d7fdb7746b6a9e1a32820b1b22a8b9e2eb985f8aef0ab5f6305bae5fba9b6bb9af6ea85be4d87ff2a70819fb4193a65cf8595
-
Filesize
168KB
MD5f575916b471e57c2fb30d0961b68851e
SHA1c4645df1b70023ca7f3f893a41db3b80d42faa17
SHA256c85af441e0fc11f8187a208966459cbc9cb8b5ec08121a48b93a5a4ddd05f913
SHA512d177e1fc75b3e9368413f03fa6874efbe7fe15398a06589d74435d065fb2c3b65418a084ed9b663c24ddb1caa3ed90ebaa7dba780772bf57810dade75c3f8d0e
-
Filesize
168KB
MD5f575916b471e57c2fb30d0961b68851e
SHA1c4645df1b70023ca7f3f893a41db3b80d42faa17
SHA256c85af441e0fc11f8187a208966459cbc9cb8b5ec08121a48b93a5a4ddd05f913
SHA512d177e1fc75b3e9368413f03fa6874efbe7fe15398a06589d74435d065fb2c3b65418a084ed9b663c24ddb1caa3ed90ebaa7dba780772bf57810dade75c3f8d0e
-
Filesize
525KB
MD58089dfd6c34449b52b3aefd3966d7f1a
SHA13e1ccd25d6412c688b56557d101f5bd8c5a3257c
SHA256b6d4a68abf3c24545f4977c1f3314278471b4f48af94e6c65739eb0ac089b416
SHA512771662bf2b0606f641f74f063ed0a3914c2bac2d268a6190f9e07dbd3ca9a3aa69eb328899d83efd5bb7e1618872a8ee29cd745cc47e6f642c2085fd777870bb
-
Filesize
525KB
MD58089dfd6c34449b52b3aefd3966d7f1a
SHA13e1ccd25d6412c688b56557d101f5bd8c5a3257c
SHA256b6d4a68abf3c24545f4977c1f3314278471b4f48af94e6c65739eb0ac089b416
SHA512771662bf2b0606f641f74f063ed0a3914c2bac2d268a6190f9e07dbd3ca9a3aa69eb328899d83efd5bb7e1618872a8ee29cd745cc47e6f642c2085fd777870bb
-
Filesize
11KB
MD50465e2d85b6cdba377cac8d63fc18e45
SHA10880fd9edbb3d99c44bcb6afd5ff31eb95395e7f
SHA256a8ed4643040baa9c91555c91c9d1d2f5fd06859458710ee3b7afb17f46fb39da
SHA512c5be4ec6a22529f96b59fa7b3a10cd191ba9d2c49cbb9b31a2a709bc052022d905122815c831a5b0db473e7f7f7719a13fc4389a1c0f881f844103349a96de7f
-
Filesize
11KB
MD50465e2d85b6cdba377cac8d63fc18e45
SHA10880fd9edbb3d99c44bcb6afd5ff31eb95395e7f
SHA256a8ed4643040baa9c91555c91c9d1d2f5fd06859458710ee3b7afb17f46fb39da
SHA512c5be4ec6a22529f96b59fa7b3a10cd191ba9d2c49cbb9b31a2a709bc052022d905122815c831a5b0db473e7f7f7719a13fc4389a1c0f881f844103349a96de7f
-
Filesize
501KB
MD5252cef41445d9f240bcea4b793f76586
SHA14c5dfb1f6295dec0259a33a96398e9c794059ac7
SHA256298d8626d0b2a13728314dd6bfa11ed101266bca5c0052b392041ce952c93b4a
SHA512015418b9a0e2f1634717c486fcc5bb5876337bd9693e8c0572762f7587e02bc8c4fcc42e74eff6422b9d20c74d8e1cb780d4c07485e62b07cfee7d28d0764b2b
-
Filesize
501KB
MD5252cef41445d9f240bcea4b793f76586
SHA14c5dfb1f6295dec0259a33a96398e9c794059ac7
SHA256298d8626d0b2a13728314dd6bfa11ed101266bca5c0052b392041ce952c93b4a
SHA512015418b9a0e2f1634717c486fcc5bb5876337bd9693e8c0572762f7587e02bc8c4fcc42e74eff6422b9d20c74d8e1cb780d4c07485e62b07cfee7d28d0764b2b
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1