Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2023 18:27
Static task
static1
General
-
Target
8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe
-
Size
1.1MB
-
MD5
53de5877ceb00c4a73de66190d733bb6
-
SHA1
190c74ad8fc2c07da7487559dba238aab0da3671
-
SHA256
8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153
-
SHA512
afc90122f61dab160e0e9a488795b1c3ae3a4a0ceb2b6f9580e59fc396aef8562fb0fd79033212281e69c31031f280ee88f2c77ba6a3ee5af183b1ea4302791c
-
SSDEEP
24576:mytlU2zMu0xMopRCDdYe78ou2LU9QXQr7B1aOFxWI0V3Y0Fs:1t+ZTTsdYe78ouseQXQrN1aOFxW9z
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr777472.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr777472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr777472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr777472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr777472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr777472.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation si678819.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation qu347185.exe -
Executes dropped EXE 9 IoCs
pid Process 4956 un842620.exe 364 un574407.exe 2064 pr777472.exe 396 qu347185.exe 4816 1.exe 4428 rk163312.exe 3364 si678819.exe 4484 oneetx.exe 3280 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4612 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr777472.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr777472.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un842620.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un842620.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un574407.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un574407.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 29 IoCs
pid pid_target Process procid_target 4172 2064 WerFault.exe 84 3320 396 WerFault.exe 93 3056 3364 WerFault.exe 100 2344 3364 WerFault.exe 100 3356 3364 WerFault.exe 100 4720 3364 WerFault.exe 100 2960 3364 WerFault.exe 100 764 3364 WerFault.exe 100 5056 3364 WerFault.exe 100 5076 3364 WerFault.exe 100 2516 3364 WerFault.exe 100 1560 3364 WerFault.exe 100 3188 4484 WerFault.exe 119 4696 4484 WerFault.exe 119 4452 4484 WerFault.exe 119 2352 4484 WerFault.exe 119 4052 4484 WerFault.exe 119 948 4484 WerFault.exe 119 644 4484 WerFault.exe 119 2524 4484 WerFault.exe 119 1616 4484 WerFault.exe 119 1720 4484 WerFault.exe 119 3944 4484 WerFault.exe 119 1756 4484 WerFault.exe 119 1292 4484 WerFault.exe 119 3292 4484 WerFault.exe 119 4684 4484 WerFault.exe 119 3572 3280 WerFault.exe 150 872 4484 WerFault.exe 119 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1828 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2064 pr777472.exe 2064 pr777472.exe 4428 rk163312.exe 4816 1.exe 4816 1.exe 4428 rk163312.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2064 pr777472.exe Token: SeDebugPrivilege 396 qu347185.exe Token: SeDebugPrivilege 4428 rk163312.exe Token: SeDebugPrivilege 4816 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3364 si678819.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1236 wrote to memory of 4956 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 82 PID 1236 wrote to memory of 4956 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 82 PID 1236 wrote to memory of 4956 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 82 PID 4956 wrote to memory of 364 4956 un842620.exe 83 PID 4956 wrote to memory of 364 4956 un842620.exe 83 PID 4956 wrote to memory of 364 4956 un842620.exe 83 PID 364 wrote to memory of 2064 364 un574407.exe 84 PID 364 wrote to memory of 2064 364 un574407.exe 84 PID 364 wrote to memory of 2064 364 un574407.exe 84 PID 364 wrote to memory of 396 364 un574407.exe 93 PID 364 wrote to memory of 396 364 un574407.exe 93 PID 364 wrote to memory of 396 364 un574407.exe 93 PID 396 wrote to memory of 4816 396 qu347185.exe 96 PID 396 wrote to memory of 4816 396 qu347185.exe 96 PID 396 wrote to memory of 4816 396 qu347185.exe 96 PID 4956 wrote to memory of 4428 4956 un842620.exe 99 PID 4956 wrote to memory of 4428 4956 un842620.exe 99 PID 4956 wrote to memory of 4428 4956 un842620.exe 99 PID 1236 wrote to memory of 3364 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 100 PID 1236 wrote to memory of 3364 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 100 PID 1236 wrote to memory of 3364 1236 8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe 100 PID 3364 wrote to memory of 4484 3364 si678819.exe 119 PID 3364 wrote to memory of 4484 3364 si678819.exe 119 PID 3364 wrote to memory of 4484 3364 si678819.exe 119 PID 4484 wrote to memory of 1828 4484 oneetx.exe 136 PID 4484 wrote to memory of 1828 4484 oneetx.exe 136 PID 4484 wrote to memory of 1828 4484 oneetx.exe 136 PID 4484 wrote to memory of 4612 4484 oneetx.exe 153 PID 4484 wrote to memory of 4612 4484 oneetx.exe 153 PID 4484 wrote to memory of 4612 4484 oneetx.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe"C:\Users\Admin\AppData\Local\Temp\8549be3c4d13e98a6f291a1864a94f826830a57e70f8c12b8aeeaa4e91b41153.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842620.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un574407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un574407.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr777472.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr777472.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 10845⤵
- Program crash
PID:4172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu347185.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu347185.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 396 -s 13765⤵
- Program crash
PID:3320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk163312.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk163312.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678819.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678819.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 7003⤵
- Program crash
PID:3056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 7643⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 8563⤵
- Program crash
PID:3356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 9603⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 8603⤵
- Program crash
PID:2960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 8603⤵
- Program crash
PID:764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 12243⤵
- Program crash
PID:5056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 12363⤵
- Program crash
PID:5076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 13243⤵
- Program crash
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 6924⤵
- Program crash
PID:3188
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8364⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 8484⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 10484⤵
- Program crash
PID:2352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 10884⤵
- Program crash
PID:4052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 10884⤵
- Program crash
PID:948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 11324⤵
- Program crash
PID:644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 9924⤵
- Program crash
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 7764⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 13244⤵
- Program crash
PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 13564⤵
- Program crash
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 14284⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 11564⤵
- Program crash
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 16284⤵
- Program crash
PID:3292
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 15764⤵
- Program crash
PID:4684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 16444⤵
- Program crash
PID:872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 17363⤵
- Program crash
PID:1560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2064 -ip 20641⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 396 -ip 3961⤵PID:4988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3364 -ip 33641⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3364 -ip 33641⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3364 -ip 33641⤵PID:3736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3364 -ip 33641⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3364 -ip 33641⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3364 -ip 33641⤵PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3364 -ip 33641⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3364 -ip 33641⤵PID:1400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3364 -ip 33641⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3364 -ip 33641⤵PID:1836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4484 -ip 44841⤵PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4484 -ip 44841⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4484 -ip 44841⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4484 -ip 44841⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4484 -ip 44841⤵PID:4316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4484 -ip 44841⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4484 -ip 44841⤵PID:324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4484 -ip 44841⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 4484 -ip 44841⤵PID:2952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4484 -ip 44841⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 668 -p 4484 -ip 44841⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4484 -ip 44841⤵PID:1812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4484 -ip 44841⤵PID:440
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3280 -s 1842⤵
- Program crash
PID:3572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 4484 -ip 44841⤵PID:1780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 4484 -ip 44841⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3280 -ip 32801⤵PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 720 -p 4484 -ip 44841⤵PID:1112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
817KB
MD54cb47db625fc63681e6836c5b0869cd3
SHA1f725c5d7699e3de5817317de6dbafdc307322333
SHA256ffa37cb9b9c38288737f34989a3ab7f96d032e9dc22386f785c7e49d1940beba
SHA5125bff1f6a5224513aab1da6018c6cdfb81a80998bcb8e30eb09cb2f9c7e57510078b38f766871eca77853b67947bef87122a7e1211e5d88d5bcb7801bc701c410
-
Filesize
817KB
MD54cb47db625fc63681e6836c5b0869cd3
SHA1f725c5d7699e3de5817317de6dbafdc307322333
SHA256ffa37cb9b9c38288737f34989a3ab7f96d032e9dc22386f785c7e49d1940beba
SHA5125bff1f6a5224513aab1da6018c6cdfb81a80998bcb8e30eb09cb2f9c7e57510078b38f766871eca77853b67947bef87122a7e1211e5d88d5bcb7801bc701c410
-
Filesize
169KB
MD54b1af05fca04988af1d06377dd250231
SHA1c5946f0fd43bf8eb82dff15b831c8a8c2fa2c7ba
SHA25624c7e8a5c8707b085f6b847c77477d9486d74fc7af0562c70eb35637fc6fc426
SHA512a84facfc548a5996c47b8bfbbbda7a6a6c9741ed3a911074cb9d53f4543c93c9261f30e7c47867edb6a88363a539b4606b38db0507070d31e5b69833004b6750
-
Filesize
169KB
MD54b1af05fca04988af1d06377dd250231
SHA1c5946f0fd43bf8eb82dff15b831c8a8c2fa2c7ba
SHA25624c7e8a5c8707b085f6b847c77477d9486d74fc7af0562c70eb35637fc6fc426
SHA512a84facfc548a5996c47b8bfbbbda7a6a6c9741ed3a911074cb9d53f4543c93c9261f30e7c47867edb6a88363a539b4606b38db0507070d31e5b69833004b6750
-
Filesize
664KB
MD59bf17bd0ae51d0e020a8af97a37ee7ad
SHA1599681e135a5bc3b74ef6122d4ebab302b7a42e5
SHA256f954a26a58dca1e05a769d5e5cfc7c4859f084c64438f4da0b185ed2245c10d3
SHA512c08866c6c659c49367de68aab727340a350d7bdb6945f3fd9559de5208997557988e1ec136c67a4d182559874d89dafbabb9bfbafcf0062704434a8324a4a050
-
Filesize
664KB
MD59bf17bd0ae51d0e020a8af97a37ee7ad
SHA1599681e135a5bc3b74ef6122d4ebab302b7a42e5
SHA256f954a26a58dca1e05a769d5e5cfc7c4859f084c64438f4da0b185ed2245c10d3
SHA512c08866c6c659c49367de68aab727340a350d7bdb6945f3fd9559de5208997557988e1ec136c67a4d182559874d89dafbabb9bfbafcf0062704434a8324a4a050
-
Filesize
317KB
MD51ff391c23b84204cd842624ca0ac65d7
SHA17442d31e6a7c47500b5e7c4120487b41fa9c63ec
SHA2567d152ad36478dcdb98865eee2a3e484f978cf8ac844bac1e9480efa4b885f528
SHA51219de566597f7871c56e3064985ec406c9669b0972dcb70d4bfe5ce5b1b8cdfe89accb79c547b789b2f497b658a9a70fa8318cf914e5bd351e932746886da4846
-
Filesize
317KB
MD51ff391c23b84204cd842624ca0ac65d7
SHA17442d31e6a7c47500b5e7c4120487b41fa9c63ec
SHA2567d152ad36478dcdb98865eee2a3e484f978cf8ac844bac1e9480efa4b885f528
SHA51219de566597f7871c56e3064985ec406c9669b0972dcb70d4bfe5ce5b1b8cdfe89accb79c547b789b2f497b658a9a70fa8318cf914e5bd351e932746886da4846
-
Filesize
501KB
MD587e700e8318cd931ac43e117ac567ed4
SHA1de7c8d2a1618c256e7fafa9b97ca695f9c187fd9
SHA256f07b966db3009ca402a995d996d5705a4101d401f5bc32961e99544d99e9659c
SHA512e4284c960e87cfc4e12cc4de52a6445dcf6e50ae48e9e4556ae88cba0119de076647521fedfc8d9ae793f86fdc960e3087e461ca017521a715f8ef05ac279d2d
-
Filesize
501KB
MD587e700e8318cd931ac43e117ac567ed4
SHA1de7c8d2a1618c256e7fafa9b97ca695f9c187fd9
SHA256f07b966db3009ca402a995d996d5705a4101d401f5bc32961e99544d99e9659c
SHA512e4284c960e87cfc4e12cc4de52a6445dcf6e50ae48e9e4556ae88cba0119de076647521fedfc8d9ae793f86fdc960e3087e461ca017521a715f8ef05ac279d2d
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1