Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 03:41
Static task
static1
General
-
Target
3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe
-
Size
1.2MB
-
MD5
3591a04d98b384527372a53ff5d40b66
-
SHA1
c4bdf8ee57f3099cff5156b4b5eb2bbd5cb69af8
-
SHA256
3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840
-
SHA512
f5a43aa244a3ca10f77fc4919f90db7f1e62045f66c1a3da0dfa6de6d668006183fa029d8e915451a85adf5932786e76a6d00107d59e3268524b45295f615a67
-
SSDEEP
24576:TyBWYWuB/TqUjF0h9hMQvpnAm8+DGioL/t0gC1HkuMsWMH:mBWRu1zjix78ZioLa1HkuMsB
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr521385.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu666308.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si947294.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1672 un065316.exe 608 un885047.exe 1988 pr521385.exe 3168 qu666308.exe 2584 1.exe 872 rk788489.exe 1960 si947294.exe 5044 oneetx.exe 3744 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3612 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr521385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr521385.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un065316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un065316.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un885047.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un885047.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 3292 1988 WerFault.exe 85 4264 3168 WerFault.exe 91 384 1960 WerFault.exe 100 468 1960 WerFault.exe 100 4480 1960 WerFault.exe 100 1460 1960 WerFault.exe 100 1264 1960 WerFault.exe 100 2164 1960 WerFault.exe 100 4148 1960 WerFault.exe 100 3364 1960 WerFault.exe 100 4280 1960 WerFault.exe 100 3160 1960 WerFault.exe 100 4876 5044 WerFault.exe 120 2144 5044 WerFault.exe 120 3508 5044 WerFault.exe 120 2132 5044 WerFault.exe 120 2872 5044 WerFault.exe 120 888 5044 WerFault.exe 120 4864 5044 WerFault.exe 120 4008 5044 WerFault.exe 120 2636 5044 WerFault.exe 120 1316 5044 WerFault.exe 120 3380 5044 WerFault.exe 120 1272 5044 WerFault.exe 120 4012 5044 WerFault.exe 120 768 3744 WerFault.exe 151 5112 5044 WerFault.exe 120 4480 5044 WerFault.exe 120 2616 5044 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4392 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1988 pr521385.exe 1988 pr521385.exe 2584 1.exe 872 rk788489.exe 2584 1.exe 872 rk788489.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1988 pr521385.exe Token: SeDebugPrivilege 3168 qu666308.exe Token: SeDebugPrivilege 872 rk788489.exe Token: SeDebugPrivilege 2584 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1960 si947294.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 228 wrote to memory of 1672 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 83 PID 228 wrote to memory of 1672 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 83 PID 228 wrote to memory of 1672 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 83 PID 1672 wrote to memory of 608 1672 un065316.exe 84 PID 1672 wrote to memory of 608 1672 un065316.exe 84 PID 1672 wrote to memory of 608 1672 un065316.exe 84 PID 608 wrote to memory of 1988 608 un885047.exe 85 PID 608 wrote to memory of 1988 608 un885047.exe 85 PID 608 wrote to memory of 1988 608 un885047.exe 85 PID 608 wrote to memory of 3168 608 un885047.exe 91 PID 608 wrote to memory of 3168 608 un885047.exe 91 PID 608 wrote to memory of 3168 608 un885047.exe 91 PID 3168 wrote to memory of 2584 3168 qu666308.exe 93 PID 3168 wrote to memory of 2584 3168 qu666308.exe 93 PID 3168 wrote to memory of 2584 3168 qu666308.exe 93 PID 1672 wrote to memory of 872 1672 un065316.exe 96 PID 1672 wrote to memory of 872 1672 un065316.exe 96 PID 1672 wrote to memory of 872 1672 un065316.exe 96 PID 228 wrote to memory of 1960 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 100 PID 228 wrote to memory of 1960 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 100 PID 228 wrote to memory of 1960 228 3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe 100 PID 1960 wrote to memory of 5044 1960 si947294.exe 120 PID 1960 wrote to memory of 5044 1960 si947294.exe 120 PID 1960 wrote to memory of 5044 1960 si947294.exe 120 PID 5044 wrote to memory of 4392 5044 oneetx.exe 137 PID 5044 wrote to memory of 4392 5044 oneetx.exe 137 PID 5044 wrote to memory of 4392 5044 oneetx.exe 137 PID 5044 wrote to memory of 3612 5044 oneetx.exe 156 PID 5044 wrote to memory of 3612 5044 oneetx.exe 156 PID 5044 wrote to memory of 3612 5044 oneetx.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe"C:\Users\Admin\AppData\Local\Temp\3d16aa0eed9753535a4a7ca98c2bd1baa2d19d2604a584a4874e71cc44ae0840.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un065316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un885047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un885047.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr521385.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr521385.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 10845⤵
- Program crash
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu666308.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu666308.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 13885⤵
- Program crash
PID:4264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk788489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk788489.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947294.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947294.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7003⤵
- Program crash
PID:384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 7883⤵
- Program crash
PID:468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 8643⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 8723⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 9923⤵
- Program crash
PID:1264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10003⤵
- Program crash
PID:2164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 12003⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 12443⤵
- Program crash
PID:3364
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 13203⤵
- Program crash
PID:4280
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 6964⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 7924⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9044⤵
- Program crash
PID:3508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 10644⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 10764⤵
- Program crash
PID:2872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 10764⤵
- Program crash
PID:888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 11404⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9964⤵
- Program crash
PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 13004⤵
- Program crash
PID:2636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 13084⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 9924⤵
- Program crash
PID:3380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 14284⤵
- Program crash
PID:1272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 11644⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 16284⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 11524⤵
- Program crash
PID:4480
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 16444⤵
- Program crash
PID:2616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 13643⤵
- Program crash
PID:3160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1988 -ip 19881⤵PID:1456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3168 -ip 31681⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1960 -ip 19601⤵PID:4300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1960 -ip 19601⤵PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1960 -ip 19601⤵PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1960 -ip 19601⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1960 -ip 19601⤵PID:820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1960 -ip 19601⤵PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1960 -ip 19601⤵PID:2028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1960 -ip 19601⤵PID:2832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1960 -ip 19601⤵PID:2904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 1960 -ip 19601⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5044 -ip 50441⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5044 -ip 50441⤵PID:2124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5044 -ip 50441⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5044 -ip 50441⤵PID:4360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5044 -ip 50441⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5044 -ip 50441⤵PID:412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5044 -ip 50441⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5044 -ip 50441⤵PID:4000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5044 -ip 50441⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5044 -ip 50441⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5044 -ip 50441⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 5044 -ip 50441⤵PID:4004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5044 -ip 50441⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 3162⤵
- Program crash
PID:768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3744 -ip 37441⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5044 -ip 50441⤵PID:4816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5044 -ip 50441⤵PID:4664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 5044 -ip 50441⤵PID:372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
863KB
MD532ce48812e8c0507c608e7dbda3b9f3e
SHA1799c4192e2a8cc4e0a86a4f404e06b7e0b0191ac
SHA256ff5f9b40a0924cb73e27d9c594326bbe29aecd520df82615e1f377ff77b25673
SHA5120650a40dc8050a5872aef2f539ec4f718ee058d6cd67d6d5116669e2ec080479a1d8aba360593674bb55aed07b386e701738ac39fb9addf33c5151051b520d8a
-
Filesize
863KB
MD532ce48812e8c0507c608e7dbda3b9f3e
SHA1799c4192e2a8cc4e0a86a4f404e06b7e0b0191ac
SHA256ff5f9b40a0924cb73e27d9c594326bbe29aecd520df82615e1f377ff77b25673
SHA5120650a40dc8050a5872aef2f539ec4f718ee058d6cd67d6d5116669e2ec080479a1d8aba360593674bb55aed07b386e701738ac39fb9addf33c5151051b520d8a
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
709KB
MD55c944219c913fd787e6fbf64730a74d6
SHA14430443e390cd09f29c07b547827bbfbcdc1d255
SHA2566fff216d22f01ca6316e4a3937ba4c106ac2e5e4dc146bf854c57fec9123765c
SHA512d62013274cc5d7e4c3eade49aed6326fc2eafc5e378ce2f7b9c82cc5777def5b62f38535378eef353bdca1aba14c3d497a6e316679002a6272650454f710cc3c
-
Filesize
709KB
MD55c944219c913fd787e6fbf64730a74d6
SHA14430443e390cd09f29c07b547827bbfbcdc1d255
SHA2566fff216d22f01ca6316e4a3937ba4c106ac2e5e4dc146bf854c57fec9123765c
SHA512d62013274cc5d7e4c3eade49aed6326fc2eafc5e378ce2f7b9c82cc5777def5b62f38535378eef353bdca1aba14c3d497a6e316679002a6272650454f710cc3c
-
Filesize
404KB
MD550c4d9af5879823f2f5572c8ca9c4832
SHA17bca58e4a02903b377bf43917fabe63f111971aa
SHA256031c3b1587ddb9b3e69cbdf2d41962448323ca0ab649c7f15a7e7efcc7fda3be
SHA512eb7b3107b57d61ec4d8205f8a826e21dc355838b3ecfd5400d07a9af4d3cda6d3f9c87bd5ec8a08072942acc71d0985e911b12f5748d25a8720a82b93bf45347
-
Filesize
404KB
MD550c4d9af5879823f2f5572c8ca9c4832
SHA17bca58e4a02903b377bf43917fabe63f111971aa
SHA256031c3b1587ddb9b3e69cbdf2d41962448323ca0ab649c7f15a7e7efcc7fda3be
SHA512eb7b3107b57d61ec4d8205f8a826e21dc355838b3ecfd5400d07a9af4d3cda6d3f9c87bd5ec8a08072942acc71d0985e911b12f5748d25a8720a82b93bf45347
-
Filesize
588KB
MD58faf6cc9af4601a2c399b8b4b0330aab
SHA182dcc50b1a763d2fb915a9f2a6d90e08dc8c4333
SHA256c3a3c3965703209efbddb3344b9c98b974577f42cbd30448214048e0ff9ee406
SHA512029ee59b4c0745cc2138bd31d1be0f8f51a73ee9fb9fd7218174960ec1b7bf3808a141b7e593d3dbbb930286e48754a1878168763b93923b2edad836908cf6bb
-
Filesize
588KB
MD58faf6cc9af4601a2c399b8b4b0330aab
SHA182dcc50b1a763d2fb915a9f2a6d90e08dc8c4333
SHA256c3a3c3965703209efbddb3344b9c98b974577f42cbd30448214048e0ff9ee406
SHA512029ee59b4c0745cc2138bd31d1be0f8f51a73ee9fb9fd7218174960ec1b7bf3808a141b7e593d3dbbb930286e48754a1878168763b93923b2edad836908cf6bb
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1