Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 14:48
Static task
static1
General
-
Target
142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe
-
Size
952KB
-
MD5
2403ec54963bd34eb732f364669c61ab
-
SHA1
7c639c1f576f6f4677cd05ef1f8462958ebaca16
-
SHA256
142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737
-
SHA512
8cf5e43826528b68e37688e1f0bb7c8ab6f7f911278e249dfe3c148e9bfeaf7922a214ae9d4fcfbab2bfbea79a9a93bdc1baa267c2af71f99b48cfe298e8b72d
-
SSDEEP
24576:myem3OVyGRQYB2qA/eiAahAgeGNUNNAWBFYG:1e7V/r0/RieP
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it467730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it467730.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it467730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it467730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it467730.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it467730.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation jr033269.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation lr103260.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 1172 ziLg5562.exe 2240 ziHu0251.exe 4852 it467730.exe 4808 jr033269.exe 1656 1.exe 2288 kp341585.exe 2480 lr103260.exe 2792 oneetx.exe 2612 oneetx.exe 544 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2892 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it467730.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLg5562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLg5562.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHu0251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziHu0251.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 2580 4808 WerFault.exe 93 4208 2480 WerFault.exe 102 4672 2480 WerFault.exe 102 4760 2480 WerFault.exe 102 4300 2480 WerFault.exe 102 996 2480 WerFault.exe 102 2204 2480 WerFault.exe 102 3988 2480 WerFault.exe 102 1612 2480 WerFault.exe 102 1328 2480 WerFault.exe 102 964 2792 WerFault.exe 121 1108 2792 WerFault.exe 121 3596 2792 WerFault.exe 121 4876 2792 WerFault.exe 121 4448 2792 WerFault.exe 121 3852 2792 WerFault.exe 121 520 2792 WerFault.exe 121 216 2792 WerFault.exe 121 3476 2792 WerFault.exe 121 4492 2792 WerFault.exe 121 2212 2792 WerFault.exe 121 920 2480 WerFault.exe 102 1456 2612 WerFault.exe 146 4420 2792 WerFault.exe 121 4760 2792 WerFault.exe 121 2000 2792 WerFault.exe 121 4440 544 WerFault.exe 158 2416 2792 WerFault.exe 121 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1500 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 it467730.exe 4852 it467730.exe 1656 1.exe 2288 kp341585.exe 1656 1.exe 2288 kp341585.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4852 it467730.exe Token: SeDebugPrivilege 4808 jr033269.exe Token: SeDebugPrivilege 1656 1.exe Token: SeDebugPrivilege 2288 kp341585.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2480 lr103260.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4320 wrote to memory of 1172 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 86 PID 4320 wrote to memory of 1172 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 86 PID 4320 wrote to memory of 1172 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 86 PID 1172 wrote to memory of 2240 1172 ziLg5562.exe 87 PID 1172 wrote to memory of 2240 1172 ziLg5562.exe 87 PID 1172 wrote to memory of 2240 1172 ziLg5562.exe 87 PID 2240 wrote to memory of 4852 2240 ziHu0251.exe 88 PID 2240 wrote to memory of 4852 2240 ziHu0251.exe 88 PID 2240 wrote to memory of 4808 2240 ziHu0251.exe 93 PID 2240 wrote to memory of 4808 2240 ziHu0251.exe 93 PID 2240 wrote to memory of 4808 2240 ziHu0251.exe 93 PID 4808 wrote to memory of 1656 4808 jr033269.exe 97 PID 4808 wrote to memory of 1656 4808 jr033269.exe 97 PID 4808 wrote to memory of 1656 4808 jr033269.exe 97 PID 1172 wrote to memory of 2288 1172 ziLg5562.exe 100 PID 1172 wrote to memory of 2288 1172 ziLg5562.exe 100 PID 1172 wrote to memory of 2288 1172 ziLg5562.exe 100 PID 4320 wrote to memory of 2480 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 102 PID 4320 wrote to memory of 2480 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 102 PID 4320 wrote to memory of 2480 4320 142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe 102 PID 2480 wrote to memory of 2792 2480 lr103260.exe 121 PID 2480 wrote to memory of 2792 2480 lr103260.exe 121 PID 2480 wrote to memory of 2792 2480 lr103260.exe 121 PID 2792 wrote to memory of 1500 2792 oneetx.exe 136 PID 2792 wrote to memory of 1500 2792 oneetx.exe 136 PID 2792 wrote to memory of 1500 2792 oneetx.exe 136 PID 2792 wrote to memory of 2892 2792 oneetx.exe 155 PID 2792 wrote to memory of 2892 2792 oneetx.exe 155 PID 2792 wrote to memory of 2892 2792 oneetx.exe 155
Processes
-
C:\Users\Admin\AppData\Local\Temp\142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe"C:\Users\Admin\AppData\Local\Temp\142672515078248e3e692e7a78eaa28ef2cf6d3ebec4aebe674c732de1ea4737.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLg5562.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLg5562.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHu0251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHu0251.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it467730.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it467730.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr033269.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr033269.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 13805⤵
- Program crash
PID:2580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp341585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp341585.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr103260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr103260.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 6963⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 7723⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 8563⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 8603⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 9643⤵
- Program crash
PID:996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 9803⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 12083⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 12443⤵
- Program crash
PID:1612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 13203⤵
- Program crash
PID:1328
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 7004⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8764⤵
- Program crash
PID:1108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8884⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 10524⤵
- Program crash
PID:4876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 10924⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 10924⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 11404⤵
- Program crash
PID:520
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 9924⤵
- Program crash
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 6924⤵
- Program crash
PID:3476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8764⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 7004⤵
- Program crash
PID:2212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 10684⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 15644⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 15564⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 15684⤵
- Program crash
PID:2416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 13603⤵
- Program crash
PID:920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4808 -ip 48081⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2480 -ip 24801⤵PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2480 -ip 24801⤵PID:2152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2480 -ip 24801⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2480 -ip 24801⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2480 -ip 24801⤵PID:2024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2480 -ip 24801⤵PID:2188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2480 -ip 24801⤵PID:620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2480 -ip 24801⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2480 -ip 24801⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2792 -ip 27921⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2792 -ip 27921⤵PID:972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2792 -ip 27921⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2792 -ip 27921⤵PID:692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2792 -ip 27921⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2792 -ip 27921⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2792 -ip 27921⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2792 -ip 27921⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2792 -ip 27921⤵PID:4808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2792 -ip 27921⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2792 -ip 27921⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 3202⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2480 -ip 24801⤵PID:708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2612 -ip 26121⤵PID:780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2792 -ip 27921⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2792 -ip 27921⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2792 -ip 27921⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 3162⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 544 -ip 5441⤵PID:3920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2792 -ip 27921⤵PID:2584
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
669KB
MD5b236c57f174eb85a5746802bbb8eec8d
SHA127919fa84d7b52fb790a8b174f72ff99b5ceb41f
SHA25618b54cdbc176f890a3a012bbec0cc760c266d260a2d428b5f3059d98879e31e2
SHA512f8ab16d5fb579c5c74b483fe0e2c957e1d18bdb1af74cd55efe991583b7c3ff464e649d708f9bcfabfd414982253d38dfc691083d390ff296c28582da95c2843
-
Filesize
669KB
MD5b236c57f174eb85a5746802bbb8eec8d
SHA127919fa84d7b52fb790a8b174f72ff99b5ceb41f
SHA25618b54cdbc176f890a3a012bbec0cc760c266d260a2d428b5f3059d98879e31e2
SHA512f8ab16d5fb579c5c74b483fe0e2c957e1d18bdb1af74cd55efe991583b7c3ff464e649d708f9bcfabfd414982253d38dfc691083d390ff296c28582da95c2843
-
Filesize
168KB
MD5df6c50a63e109550607806f94e7c3515
SHA1e0c8480b5cf68f2e1f5cbbd4073fa91f3be5bc2d
SHA256fec500033b055cf356090bc755268ce921152a0e67bdb9126e48aff775b6403d
SHA5127bfcb90fa9b800473b4c63e116df4d3ff4b242ae4a5813e08a45d70a3c3899f5d503c58513ccd7b1e9a8ae138503ac39b3c5ecd8cc4fa9acb1501a3650fb2658
-
Filesize
168KB
MD5df6c50a63e109550607806f94e7c3515
SHA1e0c8480b5cf68f2e1f5cbbd4073fa91f3be5bc2d
SHA256fec500033b055cf356090bc755268ce921152a0e67bdb9126e48aff775b6403d
SHA5127bfcb90fa9b800473b4c63e116df4d3ff4b242ae4a5813e08a45d70a3c3899f5d503c58513ccd7b1e9a8ae138503ac39b3c5ecd8cc4fa9acb1501a3650fb2658
-
Filesize
514KB
MD5eb0b3c0d2bc6e85b74cc831dfa24565f
SHA1a781be6c1886ef484b8d9c5dafb105f31403962d
SHA256250e6d6fc8a9cea6ca68bae0a06edb90cad064a57087f929a52ace6bb8e98236
SHA512c63a3589f338a865c804e89401bb8ad40c36871060362490a42cdb78747b74ecd27a2ea3c413a9d93da634f7d7f80aa0cb582340d445a3bddbf6b098719d90ee
-
Filesize
514KB
MD5eb0b3c0d2bc6e85b74cc831dfa24565f
SHA1a781be6c1886ef484b8d9c5dafb105f31403962d
SHA256250e6d6fc8a9cea6ca68bae0a06edb90cad064a57087f929a52ace6bb8e98236
SHA512c63a3589f338a865c804e89401bb8ad40c36871060362490a42cdb78747b74ecd27a2ea3c413a9d93da634f7d7f80aa0cb582340d445a3bddbf6b098719d90ee
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
445KB
MD5d8ec3ec78c0594198becf7b2f7de2818
SHA13e6c6bea618231ea45d0f3eca362c6e1fc2cc3ce
SHA25652cd55577fa998df546dd308d89fe6b540d8a158b3b2b1410871a5a06f7aa3b4
SHA5120fb3b6a8135f7bb3423773556041b65904317bcb820732d2e73d5104d78720706029d52e41b6c395f7c26a0579bea087a5dd06b748a8114493ceb4382cc56ebd
-
Filesize
445KB
MD5d8ec3ec78c0594198becf7b2f7de2818
SHA13e6c6bea618231ea45d0f3eca362c6e1fc2cc3ce
SHA25652cd55577fa998df546dd308d89fe6b540d8a158b3b2b1410871a5a06f7aa3b4
SHA5120fb3b6a8135f7bb3423773556041b65904317bcb820732d2e73d5104d78720706029d52e41b6c395f7c26a0579bea087a5dd06b748a8114493ceb4382cc56ebd
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1