Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 03:52
Static task
static1
General
-
Target
6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe
-
Size
1.2MB
-
MD5
562d4289a3d32f879f4fcfcd079482b7
-
SHA1
5d4f0e3f93021d1d5b835c432fab6cfb21f08ca0
-
SHA256
6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf
-
SHA512
b270b8cd3417975b5a5ce4f1209e945f8884c453bc5e4318a01b48a98d08e8a032fbb6dc6971cbe7dd6a59825fa42c40b9a9b59c4ae77fbaa3d4cd3cf08a5281
-
SSDEEP
24576:qyqDoXW5/sV1rmgmUNGcG/1x6hWtv0vAm8SQJE7Ccovdh5AYvfNpshEi:xqEXW8mgodcj8xUCcc/5AY3nsh
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr138243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr138243.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr138243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr138243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr138243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr138243.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation qu601215.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation si795846.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 5084 un513289.exe 3612 un039449.exe 3628 pr138243.exe 3492 qu601215.exe 3788 1.exe 532 rk818641.exe 3376 si795846.exe 1388 oneetx.exe 4872 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3752 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr138243.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr138243.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un513289.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un513289.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un039449.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un039449.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 2712 3628 WerFault.exe 85 960 3492 WerFault.exe 91 3636 3376 WerFault.exe 98 4680 3376 WerFault.exe 98 1968 3376 WerFault.exe 98 4392 3376 WerFault.exe 98 3044 3376 WerFault.exe 98 3980 3376 WerFault.exe 98 4640 3376 WerFault.exe 98 1412 3376 WerFault.exe 98 3360 3376 WerFault.exe 98 2792 3376 WerFault.exe 98 2348 1388 WerFault.exe 120 3452 1388 WerFault.exe 120 1484 1388 WerFault.exe 120 2424 1388 WerFault.exe 120 4368 1388 WerFault.exe 120 3076 1388 WerFault.exe 120 2512 1388 WerFault.exe 120 3904 1388 WerFault.exe 120 3628 1388 WerFault.exe 120 3492 1388 WerFault.exe 120 4328 1388 WerFault.exe 120 992 1388 WerFault.exe 120 4828 4872 WerFault.exe 149 4780 1388 WerFault.exe 120 4292 1388 WerFault.exe 120 2408 1388 WerFault.exe 120 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3628 pr138243.exe 3628 pr138243.exe 532 rk818641.exe 3788 1.exe 3788 1.exe 532 rk818641.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3628 pr138243.exe Token: SeDebugPrivilege 3492 qu601215.exe Token: SeDebugPrivilege 532 rk818641.exe Token: SeDebugPrivilege 3788 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3376 si795846.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4480 wrote to memory of 5084 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 83 PID 4480 wrote to memory of 5084 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 83 PID 4480 wrote to memory of 5084 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 83 PID 5084 wrote to memory of 3612 5084 un513289.exe 84 PID 5084 wrote to memory of 3612 5084 un513289.exe 84 PID 5084 wrote to memory of 3612 5084 un513289.exe 84 PID 3612 wrote to memory of 3628 3612 un039449.exe 85 PID 3612 wrote to memory of 3628 3612 un039449.exe 85 PID 3612 wrote to memory of 3628 3612 un039449.exe 85 PID 3612 wrote to memory of 3492 3612 un039449.exe 91 PID 3612 wrote to memory of 3492 3612 un039449.exe 91 PID 3612 wrote to memory of 3492 3612 un039449.exe 91 PID 3492 wrote to memory of 3788 3492 qu601215.exe 92 PID 3492 wrote to memory of 3788 3492 qu601215.exe 92 PID 3492 wrote to memory of 3788 3492 qu601215.exe 92 PID 5084 wrote to memory of 532 5084 un513289.exe 95 PID 5084 wrote to memory of 532 5084 un513289.exe 95 PID 5084 wrote to memory of 532 5084 un513289.exe 95 PID 4480 wrote to memory of 3376 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 98 PID 4480 wrote to memory of 3376 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 98 PID 4480 wrote to memory of 3376 4480 6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe 98 PID 3376 wrote to memory of 1388 3376 si795846.exe 120 PID 3376 wrote to memory of 1388 3376 si795846.exe 120 PID 3376 wrote to memory of 1388 3376 si795846.exe 120 PID 1388 wrote to memory of 1824 1388 oneetx.exe 137 PID 1388 wrote to memory of 1824 1388 oneetx.exe 137 PID 1388 wrote to memory of 1824 1388 oneetx.exe 137 PID 1388 wrote to memory of 3752 1388 oneetx.exe 154 PID 1388 wrote to memory of 3752 1388 oneetx.exe 154 PID 1388 wrote to memory of 3752 1388 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe"C:\Users\Admin\AppData\Local\Temp\6a39a125bcb34201f80f58d7c4768b34079da977c3c50d9ec1f59f59416d1fcf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un513289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un513289.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un039449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un039449.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr138243.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr138243.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3628 -s 10885⤵
- Program crash
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu601215.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu601215.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 13805⤵
- Program crash
PID:960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk818641.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk818641.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si795846.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si795846.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 7003⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 7843⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 8603⤵
- Program crash
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 9803⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 9523⤵
- Program crash
PID:3044
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 9923⤵
- Program crash
PID:3980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 12203⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 12323⤵
- Program crash
PID:1412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 13243⤵
- Program crash
PID:3360
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 6964⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 8324⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 8924⤵
- Program crash
PID:1484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 10564⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 10764⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 10764⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 11164⤵
- Program crash
PID:2512
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 9964⤵
- Program crash
PID:3904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 12684⤵
- Program crash
PID:3628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 7764⤵
- Program crash
PID:3492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 9964⤵
- Program crash
PID:4328
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 10924⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 16284⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 16044⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 16364⤵
- Program crash
PID:2408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 14043⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3628 -ip 36281⤵PID:2288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3492 -ip 34921⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3376 -ip 33761⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3376 -ip 33761⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3376 -ip 33761⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3376 -ip 33761⤵PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3376 -ip 33761⤵PID:2408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3376 -ip 33761⤵PID:3488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3376 -ip 33761⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3376 -ip 33761⤵PID:388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3376 -ip 33761⤵PID:2108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3376 -ip 33761⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 1388 -ip 13881⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1388 -ip 13881⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1388 -ip 13881⤵PID:5112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 1388 -ip 13881⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1388 -ip 13881⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1388 -ip 13881⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1388 -ip 13881⤵PID:2516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 1388 -ip 13881⤵PID:3956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1388 -ip 13881⤵PID:2064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1388 -ip 13881⤵PID:2712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1388 -ip 13881⤵PID:4956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1388 -ip 13881⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 3162⤵
- Program crash
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4872 -ip 48721⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1388 -ip 13881⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1388 -ip 13881⤵PID:4284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1388 -ip 13881⤵PID:2220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
862KB
MD50e30bcc55be83f2735b028f31b670fc2
SHA152ad3b091ede20e5aa1f96c209c79f53b212e653
SHA2563c8285a782c7bce17665a92fd6db27db9c9b8c440092bf4b2faf69a143e47d2f
SHA512e01e664bb86e5f8d6672272c253551158323c9034e5d369eeeace6a4abee3972c06662fb033786faa471c33554f8b38f3434c9bc393c4d62b9af9b3384089c74
-
Filesize
862KB
MD50e30bcc55be83f2735b028f31b670fc2
SHA152ad3b091ede20e5aa1f96c209c79f53b212e653
SHA2563c8285a782c7bce17665a92fd6db27db9c9b8c440092bf4b2faf69a143e47d2f
SHA512e01e664bb86e5f8d6672272c253551158323c9034e5d369eeeace6a4abee3972c06662fb033786faa471c33554f8b38f3434c9bc393c4d62b9af9b3384089c74
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
708KB
MD54537ffb0c8fd4c12e03c31af08607d07
SHA1832b9cc97fe794158ffdf6bbc30273e27bbac592
SHA2567a7f8e5ea58e7058436c5cb35f51f25e322ea5db1ba2169185d9ca63f22f3275
SHA512d3d4c9b4cf2ba13b17f0e21db911a30f11582dcaacb04289d180579a46660a833cd81c0074f6b0f4d68b77c14eb9c8f436437f2b0f24a16ab0c8bf3a94412ce2
-
Filesize
708KB
MD54537ffb0c8fd4c12e03c31af08607d07
SHA1832b9cc97fe794158ffdf6bbc30273e27bbac592
SHA2567a7f8e5ea58e7058436c5cb35f51f25e322ea5db1ba2169185d9ca63f22f3275
SHA512d3d4c9b4cf2ba13b17f0e21db911a30f11582dcaacb04289d180579a46660a833cd81c0074f6b0f4d68b77c14eb9c8f436437f2b0f24a16ab0c8bf3a94412ce2
-
Filesize
404KB
MD50497641cc7d815b35069cf64ba892e98
SHA1d4c8a7b9bf779f51a4f0336f2d41be02b2ba7142
SHA2568da2769aef7fb0bdcec99d9c4bfb18206651f27f692f47ad6e5d9d53f89722ce
SHA51253d94635b26f3067fea548a1f1b6232389829a7fb5330040763299ec741ca756e3c7a47e8412acca7eaebe76f274fd895efbaee60fae310bcf0cc43724403389
-
Filesize
404KB
MD50497641cc7d815b35069cf64ba892e98
SHA1d4c8a7b9bf779f51a4f0336f2d41be02b2ba7142
SHA2568da2769aef7fb0bdcec99d9c4bfb18206651f27f692f47ad6e5d9d53f89722ce
SHA51253d94635b26f3067fea548a1f1b6232389829a7fb5330040763299ec741ca756e3c7a47e8412acca7eaebe76f274fd895efbaee60fae310bcf0cc43724403389
-
Filesize
588KB
MD53ba5d8e77b1b5e9123e55608ef8edad6
SHA1d5948290fe7e18028a761b21f6a54600dd37e88a
SHA256a7faf69bd23d478274be72aa82d8fd892cd338a4e6cda01c3262ebefee80e72c
SHA51258ac67b626795c396b6d1d4f9118f1842eab669b1b4aeb8769112b67e1d2bddea159d11195f06f734842829c40848f42f8b9ee504b2cff2586c0e4720da133a1
-
Filesize
588KB
MD53ba5d8e77b1b5e9123e55608ef8edad6
SHA1d5948290fe7e18028a761b21f6a54600dd37e88a
SHA256a7faf69bd23d478274be72aa82d8fd892cd338a4e6cda01c3262ebefee80e72c
SHA51258ac67b626795c396b6d1d4f9118f1842eab669b1b4aeb8769112b67e1d2bddea159d11195f06f734842829c40848f42f8b9ee504b2cff2586c0e4720da133a1
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1