Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 17:15
Static task
static1
General
-
Target
f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe
-
Size
961KB
-
MD5
9c6ba962699374a85c2dd179f81a7db3
-
SHA1
f8a22d05ffeff33d9377d3327612f5c0950826ec
-
SHA256
f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6
-
SHA512
370872603761942fcc893cf5c170c0347a4646fa3292dae5a85fb57e35aea560588febe0216a279336b41c62cae67d033d5b3447fb95616f64115292b5fd9dd1
-
SSDEEP
24576:XyFARihcYcPjiImRk8Hxa2nNHLRifpQ59AqU9zpWEm5U74:iFARiwiIMHxa2nafpGA9Xq5U
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it797074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it797074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it797074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it797074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it797074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it797074.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation jr969846.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation lr568388.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 996 ziJo6119.exe 4264 zidj0260.exe 908 it797074.exe 4348 jr969846.exe 4132 1.exe 1772 kp256052.exe 2792 lr568388.exe 4280 oneetx.exe 3304 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2036 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it797074.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziJo6119.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJo6119.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zidj0260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidj0260.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4856 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 2948 4348 WerFault.exe 89 4916 2792 WerFault.exe 95 3956 2792 WerFault.exe 95 3744 2792 WerFault.exe 95 1080 2792 WerFault.exe 95 2520 2792 WerFault.exe 95 5016 2792 WerFault.exe 95 4856 2792 WerFault.exe 95 2492 2792 WerFault.exe 95 3184 2792 WerFault.exe 95 1308 2792 WerFault.exe 95 1988 2792 WerFault.exe 95 4972 4280 WerFault.exe 119 2796 4280 WerFault.exe 119 1140 4280 WerFault.exe 119 3424 4280 WerFault.exe 119 1004 4280 WerFault.exe 119 4052 4280 WerFault.exe 119 3988 4280 WerFault.exe 119 2916 4280 WerFault.exe 119 4584 4280 WerFault.exe 119 3188 4280 WerFault.exe 119 1188 4280 WerFault.exe 119 1408 4280 WerFault.exe 119 2292 4280 WerFault.exe 119 1444 4280 WerFault.exe 119 1376 4280 WerFault.exe 119 4208 3304 WerFault.exe 151 4484 4280 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 908 it797074.exe 908 it797074.exe 4132 1.exe 1772 kp256052.exe 1772 kp256052.exe 4132 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 908 it797074.exe Token: SeDebugPrivilege 4348 jr969846.exe Token: SeDebugPrivilege 4132 1.exe Token: SeDebugPrivilege 1772 kp256052.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2792 lr568388.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4456 wrote to memory of 996 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 83 PID 4456 wrote to memory of 996 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 83 PID 4456 wrote to memory of 996 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 83 PID 996 wrote to memory of 4264 996 ziJo6119.exe 84 PID 996 wrote to memory of 4264 996 ziJo6119.exe 84 PID 996 wrote to memory of 4264 996 ziJo6119.exe 84 PID 4264 wrote to memory of 908 4264 zidj0260.exe 85 PID 4264 wrote to memory of 908 4264 zidj0260.exe 85 PID 4264 wrote to memory of 4348 4264 zidj0260.exe 89 PID 4264 wrote to memory of 4348 4264 zidj0260.exe 89 PID 4264 wrote to memory of 4348 4264 zidj0260.exe 89 PID 4348 wrote to memory of 4132 4348 jr969846.exe 90 PID 4348 wrote to memory of 4132 4348 jr969846.exe 90 PID 4348 wrote to memory of 4132 4348 jr969846.exe 90 PID 996 wrote to memory of 1772 996 ziJo6119.exe 93 PID 996 wrote to memory of 1772 996 ziJo6119.exe 93 PID 996 wrote to memory of 1772 996 ziJo6119.exe 93 PID 4456 wrote to memory of 2792 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 95 PID 4456 wrote to memory of 2792 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 95 PID 4456 wrote to memory of 2792 4456 f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe 95 PID 2792 wrote to memory of 4280 2792 lr568388.exe 119 PID 2792 wrote to memory of 4280 2792 lr568388.exe 119 PID 2792 wrote to memory of 4280 2792 lr568388.exe 119 PID 4280 wrote to memory of 5028 4280 oneetx.exe 137 PID 4280 wrote to memory of 5028 4280 oneetx.exe 137 PID 4280 wrote to memory of 5028 4280 oneetx.exe 137 PID 4280 wrote to memory of 2036 4280 oneetx.exe 154 PID 4280 wrote to memory of 2036 4280 oneetx.exe 154 PID 4280 wrote to memory of 2036 4280 oneetx.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe"C:\Users\Admin\AppData\Local\Temp\f460fc239fe1218ee518c637298c81cbaa53882dc292ca5b9b27a4eeadd6ace6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJo6119.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJo6119.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidj0260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidj0260.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it797074.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it797074.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr969846.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr969846.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 13805⤵
- Program crash
PID:2948
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp256052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp256052.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr568388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr568388.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 6963⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 7803⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8563⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 8603⤵
- Program crash
PID:1080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 9643⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 9643⤵
- Program crash
PID:5016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 12563⤵
- Program crash
PID:4856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 13083⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 13323⤵
- Program crash
PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 13763⤵
- Program crash
PID:1308
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6924⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 8444⤵
- Program crash
PID:2796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 8924⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 10524⤵
- Program crash
PID:3424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 10724⤵
- Program crash
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 10524⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 11364⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 9924⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 6884⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 12924⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 7724⤵
- Program crash
PID:1188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 14764⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 11124⤵
- Program crash
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 16444⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 15844⤵
- Program crash
PID:1376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 16524⤵
- Program crash
PID:4484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 7483⤵
- Program crash
PID:1988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 43481⤵PID:2236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2792 -ip 27921⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2792 -ip 27921⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2792 -ip 27921⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2792 -ip 27921⤵PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2792 -ip 27921⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2792 -ip 27921⤵PID:3336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2792 -ip 27921⤵PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2792 -ip 27921⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2792 -ip 27921⤵PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2792 -ip 27921⤵PID:4888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2792 -ip 27921⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4280 -ip 42801⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4280 -ip 42801⤵PID:2148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4280 -ip 42801⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4280 -ip 42801⤵PID:908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4280 -ip 42801⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4280 -ip 42801⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4280 -ip 42801⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4280 -ip 42801⤵PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4280 -ip 42801⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4280 -ip 42801⤵PID:2120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4280 -ip 42801⤵PID:2632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4280 -ip 42801⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4280 -ip 42801⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 3122⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4280 -ip 42801⤵PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4280 -ip 42801⤵PID:3744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3304 -ip 33041⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4280 -ip 42801⤵PID:4996
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
678KB
MD5f343e0650fa2a62d52f3087d154b1ab1
SHA1eebcb8d6b27bf2e54ca71dcdd8ba64c480070abc
SHA256c9ca941d97eaa9cb4dd387444525de871e43ab6acf3b15f69894a23e647fbc5b
SHA51239c9f3febde0c209094a76905375cbedb9e51bc04c6cd39dec019524d0410c69bd477788bdbdced3e33bfe95d21d23e8c3977392af2a5d2cb5421b39d14a5ea4
-
Filesize
678KB
MD5f343e0650fa2a62d52f3087d154b1ab1
SHA1eebcb8d6b27bf2e54ca71dcdd8ba64c480070abc
SHA256c9ca941d97eaa9cb4dd387444525de871e43ab6acf3b15f69894a23e647fbc5b
SHA51239c9f3febde0c209094a76905375cbedb9e51bc04c6cd39dec019524d0410c69bd477788bdbdced3e33bfe95d21d23e8c3977392af2a5d2cb5421b39d14a5ea4
-
Filesize
169KB
MD5329f83ff8dfbc2b51f757ff984f31a44
SHA1eeab6ee782f9df6af8f62c9df3272cbf7ffb923c
SHA2562c1289dfd53c9bc951bf17dcdfd9393ae2b17b01524f588500fe7e8608cfcfb2
SHA512f24820235f5e833b08d44a2c4d85e1f8e38df5860136bd54e7cf48d9dd1f7e80603104d948a07832c1803ab9884b94eefec2409ea685abf792f64b68be8fde66
-
Filesize
169KB
MD5329f83ff8dfbc2b51f757ff984f31a44
SHA1eeab6ee782f9df6af8f62c9df3272cbf7ffb923c
SHA2562c1289dfd53c9bc951bf17dcdfd9393ae2b17b01524f588500fe7e8608cfcfb2
SHA512f24820235f5e833b08d44a2c4d85e1f8e38df5860136bd54e7cf48d9dd1f7e80603104d948a07832c1803ab9884b94eefec2409ea685abf792f64b68be8fde66
-
Filesize
525KB
MD59495e867aa314b9b4a230147cd1c4e9c
SHA1390bccf7515aa993ea5640dbf43147ada16066a7
SHA256dd1500bddfeb9a22597e58de2f61d8a53c7ec5610bdc0f6c36370a14c0ab3284
SHA512a1a02c830ae77d9623b8fd239772f7480f7d114d1261cddda4a8105f4afe1785b4fceeaa2470e893c1a9dfbf4180a069aa3035dbc5ec707c4f4b02e8088fd812
-
Filesize
525KB
MD59495e867aa314b9b4a230147cd1c4e9c
SHA1390bccf7515aa993ea5640dbf43147ada16066a7
SHA256dd1500bddfeb9a22597e58de2f61d8a53c7ec5610bdc0f6c36370a14c0ab3284
SHA512a1a02c830ae77d9623b8fd239772f7480f7d114d1261cddda4a8105f4afe1785b4fceeaa2470e893c1a9dfbf4180a069aa3035dbc5ec707c4f4b02e8088fd812
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
501KB
MD5a74e6660a4b6573f10e98d9134916cfb
SHA1d3fa145ab8b8bea11776edd3018c39f671fad310
SHA256344cdc0318430121bd3ac0ce5715f17ab2350096f73cc1162195bc09d5c6a80e
SHA5127ac1371f6aab23ddbc5a4a0c313977aebe43bc043acd5e8e2a4bb5a33dda1507841adf6a599fd87846c4561c6c4bb3752579bea01a994bd75bccedd97f9a4c3d
-
Filesize
501KB
MD5a74e6660a4b6573f10e98d9134916cfb
SHA1d3fa145ab8b8bea11776edd3018c39f671fad310
SHA256344cdc0318430121bd3ac0ce5715f17ab2350096f73cc1162195bc09d5c6a80e
SHA5127ac1371f6aab23ddbc5a4a0c313977aebe43bc043acd5e8e2a4bb5a33dda1507841adf6a599fd87846c4561c6c4bb3752579bea01a994bd75bccedd97f9a4c3d
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1