Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2023, 19:36
Static task
static1
General
-
Target
46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe
-
Size
963KB
-
MD5
46b88ff5862ac513bc11cf92dbf00eb2
-
SHA1
87b77dbe81932fdcaf7ec34e37bca82810aa4d91
-
SHA256
46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968
-
SHA512
f5403633fb2bf59ae0ec5a6b28cefc6cc8a85338d166fa31f0960c612a0c3d2640f250130030c3a715d25efbd6df0180e2f0ee25b26caefd99f4b1028784827a
-
SSDEEP
24576:8yjJB4zIdxuHB12euoeWC5AG1J7h3XPVJDjCI0I6:rjJswxGB12oeKGXhNwI9
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it578518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it578518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it578518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it578518.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it578518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it578518.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation jr064478.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation lr481066.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 10 IoCs
pid Process 3912 ziMB4765.exe 4812 zieA8563.exe 2180 it578518.exe 4204 jr064478.exe 3512 1.exe 628 kp326808.exe 4452 lr481066.exe 4608 oneetx.exe 940 oneetx.exe 4688 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4484 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it578518.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zieA8563.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zieA8563.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziMB4765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMB4765.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 28 IoCs
pid pid_target Process procid_target 2756 4204 WerFault.exe 89 4540 4452 WerFault.exe 98 3872 4452 WerFault.exe 98 4448 4452 WerFault.exe 98 1892 4452 WerFault.exe 98 4164 4452 WerFault.exe 98 3416 4452 WerFault.exe 98 2656 4452 WerFault.exe 98 5024 4452 WerFault.exe 98 2072 4452 WerFault.exe 98 2964 4452 WerFault.exe 98 3060 4608 WerFault.exe 117 4444 4608 WerFault.exe 117 4192 4608 WerFault.exe 117 2204 4608 WerFault.exe 117 2060 4608 WerFault.exe 117 3168 4608 WerFault.exe 117 3928 4608 WerFault.exe 117 3932 4608 WerFault.exe 117 1760 4608 WerFault.exe 117 3656 4608 WerFault.exe 117 1280 4608 WerFault.exe 117 1984 940 WerFault.exe 144 2000 4608 WerFault.exe 117 1404 4608 WerFault.exe 117 4848 4608 WerFault.exe 117 5104 4608 WerFault.exe 117 3076 4688 WerFault.exe 156 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3868 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2180 it578518.exe 2180 it578518.exe 628 kp326808.exe 3512 1.exe 628 kp326808.exe 3512 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2180 it578518.exe Token: SeDebugPrivilege 4204 jr064478.exe Token: SeDebugPrivilege 628 kp326808.exe Token: SeDebugPrivilege 3512 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4452 lr481066.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 1896 wrote to memory of 3912 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 82 PID 1896 wrote to memory of 3912 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 82 PID 1896 wrote to memory of 3912 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 82 PID 3912 wrote to memory of 4812 3912 ziMB4765.exe 83 PID 3912 wrote to memory of 4812 3912 ziMB4765.exe 83 PID 3912 wrote to memory of 4812 3912 ziMB4765.exe 83 PID 4812 wrote to memory of 2180 4812 zieA8563.exe 84 PID 4812 wrote to memory of 2180 4812 zieA8563.exe 84 PID 4812 wrote to memory of 4204 4812 zieA8563.exe 89 PID 4812 wrote to memory of 4204 4812 zieA8563.exe 89 PID 4812 wrote to memory of 4204 4812 zieA8563.exe 89 PID 4204 wrote to memory of 3512 4204 jr064478.exe 93 PID 4204 wrote to memory of 3512 4204 jr064478.exe 93 PID 4204 wrote to memory of 3512 4204 jr064478.exe 93 PID 3912 wrote to memory of 628 3912 ziMB4765.exe 97 PID 3912 wrote to memory of 628 3912 ziMB4765.exe 97 PID 3912 wrote to memory of 628 3912 ziMB4765.exe 97 PID 1896 wrote to memory of 4452 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 98 PID 1896 wrote to memory of 4452 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 98 PID 1896 wrote to memory of 4452 1896 46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe 98 PID 4452 wrote to memory of 4608 4452 lr481066.exe 117 PID 4452 wrote to memory of 4608 4452 lr481066.exe 117 PID 4452 wrote to memory of 4608 4452 lr481066.exe 117 PID 4608 wrote to memory of 3868 4608 oneetx.exe 134 PID 4608 wrote to memory of 3868 4608 oneetx.exe 134 PID 4608 wrote to memory of 3868 4608 oneetx.exe 134 PID 4608 wrote to memory of 4484 4608 oneetx.exe 151 PID 4608 wrote to memory of 4484 4608 oneetx.exe 151 PID 4608 wrote to memory of 4484 4608 oneetx.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe"C:\Users\Admin\AppData\Local\Temp\46c7a334612660bf8a3fba9b6dc36889a497dc1842ecd673a3df0b76bfa13968.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMB4765.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMB4765.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieA8563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieA8563.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it578518.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it578518.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr064478.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr064478.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 10685⤵
- Program crash
PID:2756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp326808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp326808.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr481066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr481066.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 6963⤵
- Program crash
PID:4540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 7803⤵
- Program crash
PID:3872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 8563⤵
- Program crash
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 9683⤵
- Program crash
PID:1892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 9883⤵
- Program crash
PID:4164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 9883⤵
- Program crash
PID:3416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 12203⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 12683⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 12443⤵
- Program crash
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 6924⤵
- Program crash
PID:3060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7924⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8924⤵
- Program crash
PID:4192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10524⤵
- Program crash
PID:2204
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10724⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10724⤵
- Program crash
PID:3168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 10884⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7924⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 7684⤵
- Program crash
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 6764⤵
- Program crash
PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 8684⤵
- Program crash
PID:1280
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 11324⤵
- Program crash
PID:2000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 16124⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 15604⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4608 -s 16284⤵
- Program crash
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 13603⤵
- Program crash
PID:2964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4204 -ip 42041⤵PID:1732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4452 -ip 44521⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4452 -ip 44521⤵PID:5016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4452 -ip 44521⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4452 -ip 44521⤵PID:1244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4452 -ip 44521⤵PID:1656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4452 -ip 44521⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4452 -ip 44521⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4452 -ip 44521⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4452 -ip 44521⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4452 -ip 44521⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4608 -ip 46081⤵PID:4036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4608 -ip 46081⤵PID:2436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4608 -ip 46081⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4608 -ip 46081⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4608 -ip 46081⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4608 -ip 46081⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4608 -ip 46081⤵PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4608 -ip 46081⤵PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4608 -ip 46081⤵PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4608 -ip 46081⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4608 -ip 46081⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 3202⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 940 -ip 9401⤵PID:1628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4608 -ip 46081⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4608 -ip 46081⤵PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4608 -ip 46081⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4608 -ip 46081⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 3162⤵
- Program crash
PID:3076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4688 -ip 46881⤵PID:4532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
680KB
MD58af727f34975ab46c8a38c7253d1380b
SHA17eb4891323477b4d0a537f68903dfe4e1b20a7c3
SHA2564be960020a54a408014704563891df87900e34ab3ba1ef6f8fc2c2e28a160642
SHA5126649ef2dcf37a0f41e0ca22ee42277cfc1375338929d899967eca21251e5691d542a04ff1151866f122b0293f133d039ead466ccdd6c08cda1e654c8f798517e
-
Filesize
680KB
MD58af727f34975ab46c8a38c7253d1380b
SHA17eb4891323477b4d0a537f68903dfe4e1b20a7c3
SHA2564be960020a54a408014704563891df87900e34ab3ba1ef6f8fc2c2e28a160642
SHA5126649ef2dcf37a0f41e0ca22ee42277cfc1375338929d899967eca21251e5691d542a04ff1151866f122b0293f133d039ead466ccdd6c08cda1e654c8f798517e
-
Filesize
169KB
MD57d63f73c815e1f689de27f0009a35a96
SHA1307f704e4a7e7a8b93db1151b13fb213e6b247f8
SHA2568ce07aa4994c5d42f74357a4178291cadc0cb5cfd6a3ce3e8b023a300e8f2622
SHA512790ab6603aea4c4bdb9fc4f3234dbee3f331cf4b2fa4467a720956063a139530b2038c53e4a42630d3db7e6a9dfbabf997edb6b7e31d983d52919f48cb4e9523
-
Filesize
169KB
MD57d63f73c815e1f689de27f0009a35a96
SHA1307f704e4a7e7a8b93db1151b13fb213e6b247f8
SHA2568ce07aa4994c5d42f74357a4178291cadc0cb5cfd6a3ce3e8b023a300e8f2622
SHA512790ab6603aea4c4bdb9fc4f3234dbee3f331cf4b2fa4467a720956063a139530b2038c53e4a42630d3db7e6a9dfbabf997edb6b7e31d983d52919f48cb4e9523
-
Filesize
525KB
MD5fb4c56d82d3f0c4f48a50b7d188bb285
SHA18bdda83f13d5f02dd78e6c31c9081a1affa3d324
SHA256904bf0c6a0dcd781f6b0d013dc7d65f25cf775987e2f4ade12617f1b5790d6b8
SHA51270ece1c28894892de1a64eea402480bdbff15020f5d8cbf957577fe9f112c0652cda9bb8ab3bbea67014143fb6d1779d2cf6ce03e3ce895cf44b72181caf7d10
-
Filesize
525KB
MD5fb4c56d82d3f0c4f48a50b7d188bb285
SHA18bdda83f13d5f02dd78e6c31c9081a1affa3d324
SHA256904bf0c6a0dcd781f6b0d013dc7d65f25cf775987e2f4ade12617f1b5790d6b8
SHA51270ece1c28894892de1a64eea402480bdbff15020f5d8cbf957577fe9f112c0652cda9bb8ab3bbea67014143fb6d1779d2cf6ce03e3ce895cf44b72181caf7d10
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
11KB
MD5ce38d9d7ecc984decac9badc6b2b4b5f
SHA1ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403
SHA256bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6
SHA5120f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd
-
Filesize
501KB
MD57fca2323401b4f28311d853fb725673f
SHA1ffd404470981a5489beafbdc3cef4b072cc8db52
SHA256c6556f9286094d4d2e8ba98f81a1e92480be9ca6d3b9b4d7a4699290d9b15e69
SHA512918041669980b6ed2392e57d6337810d8884afcd5b8611847a99fccd406be8a2b14dcb3698badfb7ab550a38cba6f36b9ae99f5915309cfdd123d096eeeda1af
-
Filesize
501KB
MD57fca2323401b4f28311d853fb725673f
SHA1ffd404470981a5489beafbdc3cef4b072cc8db52
SHA256c6556f9286094d4d2e8ba98f81a1e92480be9ca6d3b9b4d7a4699290d9b15e69
SHA512918041669980b6ed2392e57d6337810d8884afcd5b8611847a99fccd406be8a2b14dcb3698badfb7ab550a38cba6f36b9ae99f5915309cfdd123d096eeeda1af
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1