Resubmissions
19-04-2023 10:12
230419-l8kdpabf9z 1019-04-2023 09:14
230419-k7qcwahe75 1018-04-2023 11:36
230418-nqkylsch3z 10Analysis
-
max time kernel
1200s -
max time network
1188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2023 10:12
Static task
static1
Behavioral task
behavioral1
Sample
1e0c04259041599f381739e5a2779118.exe
Resource
win7-20230220-en
General
-
Target
1e0c04259041599f381739e5a2779118.exe
-
Size
282KB
-
MD5
1e0c04259041599f381739e5a2779118
-
SHA1
4aeec9e7e2d836ef69145a8451410b49d7ee8139
-
SHA256
71dfa64187315a09becab456d32e70e43ae68afbff5a601a9227089241b9c460
-
SHA512
bb1f4f064a0f7da8a7cf2aae2f7eb8687bf8f4861e168a97c4e31bced31341d552419bc96d254e11237c1227fc3836ebc802eff7af6a399a2bab62b94d3e275d
-
SSDEEP
3072:kcJiBxMfexCJCzAU0tPjv4UVA3oG+dHLnVTuX2kmo5ugsFWrO7CCFpPsOmmh16Pq:axaUCJCIjASGoGoOMF7+QpppObl7iM
Malware Config
Extracted
gcleaner
45.12.253.56
45.12.253.72
45.12.253.98
45.12.253.75
Extracted
redline
RED
79.137.202.0:81
-
auth_value
49e32ec54afd3f75dadad05dbf2e524f
Extracted
cryptbot
http://fygqwc32.top/gate.php
Extracted
laplas
http://79.137.199.252
-
api_key
ab77c1513d42148558312d676282a204d8aa055051d315af2056241c7f79c6f4
Signatures
-
Detects Stealc stealer 1 IoCs
resource yara_rule behavioral2/memory/5056-150-0x0000000000400000-0x0000000002B94000-memory.dmp family_stealc -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ paxton.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DpEditor.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion paxton.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion paxton.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 1e0c04259041599f381739e5a2779118.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation wU9M.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation WNMwUxfG.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation LBkwE.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation Coek3uKK.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ncsyncer.lnk DpEditor.exe -
Executes dropped EXE 10 IoCs
pid Process 5056 wU9M.exe 3420 LBkwE.exe 3320 WNMwUxfG.exe 3124 KR934ie2.exe 2764 7fJantRI.exe 4112 Mi430uW3.exe 1944 Coek3uKK.exe 1984 paxton.exe 224 svcservice.exe 1896 DpEditor.exe -
Loads dropped DLL 2 IoCs
pid Process 5056 wU9M.exe 5056 wU9M.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0006000000023172-445.dat themida behavioral2/files/0x0006000000023172-444.dat themida behavioral2/memory/1984-478-0x00000000004F0000-0x0000000000BEF000-memory.dmp themida behavioral2/memory/1984-764-0x00000000004F0000-0x0000000000BEF000-memory.dmp themida behavioral2/memory/1984-875-0x00000000004F0000-0x0000000000BEF000-memory.dmp themida behavioral2/files/0x000900000002317e-873.dat themida behavioral2/files/0x000900000002317e-872.dat themida behavioral2/memory/1896-889-0x00000000000D0000-0x00000000007CF000-memory.dmp themida behavioral2/memory/1896-1179-0x00000000000D0000-0x00000000007CF000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\telemetry = "C:\\Users\\Admin\\AppData\\Roaming\\telemetry\\svcservice.exe" Coek3uKK.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NCH Sync Service = "C:\\Users\\Admin\\AppData\\Roaming\\NCH Software\\DrawPad\\DpEditor.exe" DpEditor.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA paxton.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum LBkwE.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 LBkwE.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1984 paxton.exe 1896 DpEditor.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3124 set thread context of 2780 3124 KR934ie2.exe 114 PID 4112 set thread context of 2056 4112 Mi430uW3.exe 118 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 11 IoCs
pid pid_target Process procid_target 2216 532 WerFault.exe 83 2644 532 WerFault.exe 83 2200 532 WerFault.exe 83 4348 532 WerFault.exe 83 3124 532 WerFault.exe 83 2184 532 WerFault.exe 83 4800 532 WerFault.exe 83 1244 532 WerFault.exe 83 4988 532 WerFault.exe 83 3276 532 WerFault.exe 83 3108 5056 WerFault.exe 100 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz LBkwE.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 wU9M.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wU9M.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 LBkwE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString LBkwE.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1388 timeout.exe 2336 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 4856 taskkill.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1896 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5056 wU9M.exe 5056 wU9M.exe 3420 LBkwE.exe 3420 LBkwE.exe 1984 paxton.exe 1984 paxton.exe 2780 AppLaunch.exe 2780 AppLaunch.exe 2780 AppLaunch.exe 1896 DpEditor.exe 1896 DpEditor.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2780 AppLaunch.exe Token: SeDebugPrivilege 4856 taskkill.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 532 wrote to memory of 5056 532 1e0c04259041599f381739e5a2779118.exe 100 PID 532 wrote to memory of 5056 532 1e0c04259041599f381739e5a2779118.exe 100 PID 532 wrote to memory of 5056 532 1e0c04259041599f381739e5a2779118.exe 100 PID 532 wrote to memory of 3420 532 1e0c04259041599f381739e5a2779118.exe 107 PID 532 wrote to memory of 3420 532 1e0c04259041599f381739e5a2779118.exe 107 PID 532 wrote to memory of 3420 532 1e0c04259041599f381739e5a2779118.exe 107 PID 532 wrote to memory of 3320 532 1e0c04259041599f381739e5a2779118.exe 109 PID 532 wrote to memory of 3320 532 1e0c04259041599f381739e5a2779118.exe 109 PID 532 wrote to memory of 3320 532 1e0c04259041599f381739e5a2779118.exe 109 PID 3320 wrote to memory of 3124 3320 WNMwUxfG.exe 110 PID 3320 wrote to memory of 3124 3320 WNMwUxfG.exe 110 PID 3320 wrote to memory of 3124 3320 WNMwUxfG.exe 110 PID 532 wrote to memory of 2764 532 1e0c04259041599f381739e5a2779118.exe 113 PID 532 wrote to memory of 2764 532 1e0c04259041599f381739e5a2779118.exe 113 PID 3124 wrote to memory of 2780 3124 KR934ie2.exe 114 PID 3124 wrote to memory of 2780 3124 KR934ie2.exe 114 PID 3124 wrote to memory of 2780 3124 KR934ie2.exe 114 PID 3124 wrote to memory of 2780 3124 KR934ie2.exe 114 PID 3124 wrote to memory of 2780 3124 KR934ie2.exe 114 PID 3320 wrote to memory of 4112 3320 WNMwUxfG.exe 115 PID 3320 wrote to memory of 4112 3320 WNMwUxfG.exe 115 PID 3320 wrote to memory of 4112 3320 WNMwUxfG.exe 115 PID 4112 wrote to memory of 3844 4112 Mi430uW3.exe 117 PID 4112 wrote to memory of 3844 4112 Mi430uW3.exe 117 PID 4112 wrote to memory of 3844 4112 Mi430uW3.exe 117 PID 4112 wrote to memory of 2056 4112 Mi430uW3.exe 118 PID 4112 wrote to memory of 2056 4112 Mi430uW3.exe 118 PID 4112 wrote to memory of 2056 4112 Mi430uW3.exe 118 PID 4112 wrote to memory of 2056 4112 Mi430uW3.exe 118 PID 4112 wrote to memory of 2056 4112 Mi430uW3.exe 118 PID 3420 wrote to memory of 1420 3420 LBkwE.exe 120 PID 3420 wrote to memory of 1420 3420 LBkwE.exe 120 PID 3420 wrote to memory of 1420 3420 LBkwE.exe 120 PID 3320 wrote to memory of 1944 3320 WNMwUxfG.exe 122 PID 3320 wrote to memory of 1944 3320 WNMwUxfG.exe 122 PID 3320 wrote to memory of 1944 3320 WNMwUxfG.exe 122 PID 1420 wrote to memory of 1984 1420 cmd.exe 123 PID 1420 wrote to memory of 1984 1420 cmd.exe 123 PID 1420 wrote to memory of 1984 1420 cmd.exe 123 PID 3420 wrote to memory of 2608 3420 LBkwE.exe 124 PID 3420 wrote to memory of 2608 3420 LBkwE.exe 124 PID 3420 wrote to memory of 2608 3420 LBkwE.exe 124 PID 2608 wrote to memory of 1388 2608 cmd.exe 128 PID 2608 wrote to memory of 1388 2608 cmd.exe 128 PID 2608 wrote to memory of 1388 2608 cmd.exe 128 PID 532 wrote to memory of 1924 532 1e0c04259041599f381739e5a2779118.exe 130 PID 532 wrote to memory of 1924 532 1e0c04259041599f381739e5a2779118.exe 130 PID 532 wrote to memory of 1924 532 1e0c04259041599f381739e5a2779118.exe 130 PID 5056 wrote to memory of 3368 5056 wU9M.exe 134 PID 5056 wrote to memory of 3368 5056 wU9M.exe 134 PID 5056 wrote to memory of 3368 5056 wU9M.exe 134 PID 1924 wrote to memory of 4856 1924 cmd.exe 138 PID 1924 wrote to memory of 4856 1924 cmd.exe 138 PID 1924 wrote to memory of 4856 1924 cmd.exe 138 PID 3368 wrote to memory of 2336 3368 cmd.exe 139 PID 3368 wrote to memory of 2336 3368 cmd.exe 139 PID 3368 wrote to memory of 2336 3368 cmd.exe 139 PID 1944 wrote to memory of 224 1944 Coek3uKK.exe 129 PID 1944 wrote to memory of 224 1944 Coek3uKK.exe 129 PID 1944 wrote to memory of 224 1944 Coek3uKK.exe 129 PID 1984 wrote to memory of 1896 1984 paxton.exe 140 PID 1984 wrote to memory of 1896 1984 paxton.exe 140 PID 1984 wrote to memory of 1896 1984 paxton.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exeC:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe mixfive eu1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 4562⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 7682⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 7762⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 7762⤵
- Program crash
PID:4348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 8602⤵
- Program crash
PID:3124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 9282⤵
- Program crash
PID:2184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 10042⤵
- Program crash
PID:4800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 10322⤵
- Program crash
PID:1244
-
-
C:\Users\Admin\AppData\Roaming\LTD6fZ\wU9M.exe"C:\Users\Admin\AppData\Roaming\LTD6fZ\wU9M.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Roaming\LTD6fZ\wU9M.exe" & del "C:\ProgramData\*.dll"" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 23403⤵
- Program crash
PID:3108
-
-
-
C:\Users\Admin\AppData\Roaming\iw2Ed\LBkwE.exe"C:\Users\Admin\AppData\Roaming\iw2Ed\LBkwE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Roaming\7CBC50737667E17A\paxton.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Roaming\7CBC50737667E17A\paxton.exeC:\Users\Admin\AppData\Roaming\7CBC50737667E17A\paxton.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1896
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Roaming\iw2Ed\LBkwE.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\timeout.exetimeout -t 54⤵
- Delays execution with timeout.exe
PID:1388
-
-
-
-
C:\Users\Admin\AppData\Roaming\0PRqU5FNP\WNMwUxfG.exe"C:\Users\Admin\AppData\Roaming\0PRqU5FNP\WNMwUxfG.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\KR934ie2.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\KR934ie2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mi430uW3.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Mi430uW3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:3844
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Coek3uKK.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Coek3uKK.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"C:\Users\Admin\AppData\Roaming\telemetry\svcservice.exe"4⤵
- Executes dropped EXE
PID:224
-
-
-
-
C:\Users\Admin\AppData\Roaming\bdXuKds\7fJantRI.exe"C:\Users\Admin\AppData\Roaming\bdXuKds\7fJantRI.exe"2⤵
- Executes dropped EXE
PID:2764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 14002⤵
- Program crash
PID:4988
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "1e0c04259041599f381739e5a2779118.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\1e0c04259041599f381739e5a2779118.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "1e0c04259041599f381739e5a2779118.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 532 -s 15082⤵
- Program crash
PID:3276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 532 -ip 5321⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 532 -ip 5321⤵PID:1892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 532 -ip 5321⤵PID:4644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 532 -ip 5321⤵PID:1600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 532 -ip 5321⤵PID:4508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 532 -ip 5321⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 532 -ip 5321⤵PID:744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 532 -ip 5321⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 532 -ip 5321⤵PID:1468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 532 -ip 5321⤵PID:936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5056 -ip 50561⤵PID:4752
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
633B
MD5c5298d2c78be8fdfc264eb6fe3e275f8
SHA1f09de5f443da081efaff0155f422ca0375edd164
SHA256de32b3c0549fde0dc5ac435a89f16a87832a0632b6602e75f552d07074081577
SHA5125aeb5013b00e13cd8a172639bc7c675bd06cc0473ae9844c9c324e5c322987ddeff986bd4a8e620ce0ca9d1098a3ee8bbb4802789d1e89b0ec0cecf2f55a4853
-
Filesize
2B
MD5444bcb3a3fcf8389296c49467f27e1d6
SHA17a85f4764bbd6daf1c3545efbbf0f279a6dc0beb
SHA2562689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
SHA5129fbbbb5a0f329f9782e2356fa41d89cf9b3694327c1a934d6af2a9df2d7f936ce83717fb513196a4ce5548471708cd7134c2ae99b3c357bcabb2eafc7b9b7570
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
Filesize
92KB
MD5ec9dc2b3a8b24bcbda00502af0fedd51
SHA1b555e8192e4aef3f0beb5f5381a7ad7095442e8d
SHA2567378950f042c94b08cc138fd8c02e41f88b616cd17f23c0c06d4e3ca3e2937d2
SHA5129040813d94956771ce06cdc1f524e0174c481cdc0e1d93cbf8a7d76dd321a641229e5a9dd1c085e92a9f66d92b6d7edc80b77cd54bb8905852c150234a190194
-
Filesize
32B
MD530b13d77deed1641dd87896b3fa0afd9
SHA1466d549e6855c627e2901601e87b05bbc0f2c8fa
SHA2561c359e1bda712f001a46a9044a202219838ee31cd29cc7551090a2db0913399a
SHA512bfe239b285f044b3a01c938deb809bdd65ed3adb572c4ff909c25bcf5e036a6453ee1595b0d7b7c89334391e7128358e9d187f90e39c7dafbd58ccd928d7098e
-
Filesize
71KB
MD5fb2e05653c3115d89013daa5132f08e0
SHA18ad3d1f4c1652c1e173d3201faf9fdd22b229351
SHA256895ce9cfa9bd4ce960723e7adf0aba7eefff4c8cd5e46cad13cb791a39665077
SHA512ca9b7fac566026fa87872d3fdfa32a5a571613b8d9cd4364e1b05d0682d52844c9d1a28c292d6d129d506a627a6cef2a0e6329f8c2ab28cd4388789f48399238
-
Filesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
Filesize
2KB
MD51d65ace99a200cf0ac042936baf39f68
SHA1acd9cd136a2b583c7d89dcbeffad15316921b145
SHA25659f9c188335405db46c008bcd919293d3ea2e549db72d9f0f83ef34195809bc6
SHA512bfc0c01bdca82c7d5ff2210d59049a65930500eaf40b26c2aa6d6149b971b5db63edc12ee5a0ee0ccd8a33bcfcb1063eb1bcf1bbc63788976baee47224bdf486
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
1.1MB
MD5a316af84a4a0b9eaa9d13b2e9a10a79c
SHA133f663b2ce7f5d2d50c303db135cd3edd98cd95d
SHA2569986545e363a843599fde75d31fa4f611daaaa3c64ac6d8e27d24c9b5874240f
SHA512c763cc79a7c2eded3e7e83498d553d6c15eccb77dbb6baea69591ddfc8d985152fde20909df5b71a30802d7680ac6865264444acd5833f52cbdf896b3a1dd59f
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
342KB
MD5913f8b43a0a737d366bbd9aa04ea2cf3
SHA180766d487a578b3175734a253997c6f062bc2bb0
SHA256e571056f83ea8ec1d2973f40847fec85f17d26fa685187ad152ee5fb6cb2a26f
SHA512af3232674b3fa4efb01b793d6f160a8bb7840e9df79639f6b0cf6833107966ac4a81139ff88364556463fb480675b78ffe0a1a8d9ee87f9788b5da2786c0fa5e
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
2.6MB
MD56cf1a766a001c14ab610cf8b0d49a519
SHA1f6972ce0388ad64fc9ecc793dacf19fcb0f98887
SHA256d4dcde6d1d1bb0b9592816c04a3f2bb1f0958dc0e9ef4fd5a016fad1a9527024
SHA512b7707976392d3f80ab8d54bf9609eb673b352dd3a29e65c502ee11f902bd099239ac4a1c6476f71b0e5ef820e8b1934cb0e4b37d20c85b657bfe997371d670b6
-
Filesize
2.5MB
MD5913d760e2231966514afd45953222d8d
SHA1427e0ea23ff895e648dcbdce89d404f671d815ad
SHA256a361b930ea3e7336d0101bab97323603e1b06c23a42352237ad5272c464d728e
SHA512bb284b728de9d38d5e8096e6072cab4e6bf9f559aff2a302baf33371cc891adb5a441e45aee3888f2c5b643641fb1fd48489ed8e533b7593d7626653be6ee5b0
-
Filesize
2.5MB
MD5913d760e2231966514afd45953222d8d
SHA1427e0ea23ff895e648dcbdce89d404f671d815ad
SHA256a361b930ea3e7336d0101bab97323603e1b06c23a42352237ad5272c464d728e
SHA512bb284b728de9d38d5e8096e6072cab4e6bf9f559aff2a302baf33371cc891adb5a441e45aee3888f2c5b643641fb1fd48489ed8e533b7593d7626653be6ee5b0
-
Filesize
2.7MB
MD5f1408f3020118aea010dd0723f3bf552
SHA1ef8db5f164c40d5eb2187e96f1af0ff48ce692bf
SHA256a6a506293f72c81db4ed57f084ad5cb1edf850633fc71ef0333240a2d7a77324
SHA5123c9416b05d7c27b34ee15f56c2581fe799adc4c6b5b695b8b840f9584b080a1460bf0653535789d42ff25816302adc0507bbe21cc6d4253939d8361ecef2bd39
-
Filesize
2.7MB
MD5f1408f3020118aea010dd0723f3bf552
SHA1ef8db5f164c40d5eb2187e96f1af0ff48ce692bf
SHA256a6a506293f72c81db4ed57f084ad5cb1edf850633fc71ef0333240a2d7a77324
SHA5123c9416b05d7c27b34ee15f56c2581fe799adc4c6b5b695b8b840f9584b080a1460bf0653535789d42ff25816302adc0507bbe21cc6d4253939d8361ecef2bd39
-
Filesize
236KB
MD513d1288f5f5dadc4d49dff4d49892b99
SHA1e8fc4fb65025490a156bfc0b955b38ec164895cc
SHA256b2aca143071281b281d2d8c9898dfd8bae8b1951b5687429b6898d0206dc3294
SHA5127c4041021df3b0cf8cf768ed6bc5ce7bcf551df8501d1ce51aaeed3937faf80f311bfb8ce98a33bcbee3197ef0760762ea92311fd879dc668bb993494eee8c16
-
Filesize
236KB
MD513d1288f5f5dadc4d49dff4d49892b99
SHA1e8fc4fb65025490a156bfc0b955b38ec164895cc
SHA256b2aca143071281b281d2d8c9898dfd8bae8b1951b5687429b6898d0206dc3294
SHA5127c4041021df3b0cf8cf768ed6bc5ce7bcf551df8501d1ce51aaeed3937faf80f311bfb8ce98a33bcbee3197ef0760762ea92311fd879dc668bb993494eee8c16
-
Filesize
2.7MB
MD5f1408f3020118aea010dd0723f3bf552
SHA1ef8db5f164c40d5eb2187e96f1af0ff48ce692bf
SHA256a6a506293f72c81db4ed57f084ad5cb1edf850633fc71ef0333240a2d7a77324
SHA5123c9416b05d7c27b34ee15f56c2581fe799adc4c6b5b695b8b840f9584b080a1460bf0653535789d42ff25816302adc0507bbe21cc6d4253939d8361ecef2bd39
-
Filesize
2.7MB
MD5f1408f3020118aea010dd0723f3bf552
SHA1ef8db5f164c40d5eb2187e96f1af0ff48ce692bf
SHA256a6a506293f72c81db4ed57f084ad5cb1edf850633fc71ef0333240a2d7a77324
SHA5123c9416b05d7c27b34ee15f56c2581fe799adc4c6b5b695b8b840f9584b080a1460bf0653535789d42ff25816302adc0507bbe21cc6d4253939d8361ecef2bd39
-
Filesize
4KB
MD5f328a95046e3a2514c36347eaec911c0
SHA18ec9c18384ca1e08a397bf7b3d46b6d784669ef0
SHA256d55e86610dcad29c3d2857d9dae91aa51228b1fa001ea2d7bda88b9a2b5570a9
SHA5122fc3621433c5da3dcb5b9d9133cd9d63d8f53fd60c81ddab8b83bad60efb98942fc38a63dfa98edfc8358c8e4e345a7ec8fa3aa14c18d4337cdd90ea0aed4718
-
Filesize
4KB
MD5f328a95046e3a2514c36347eaec911c0
SHA18ec9c18384ca1e08a397bf7b3d46b6d784669ef0
SHA256d55e86610dcad29c3d2857d9dae91aa51228b1fa001ea2d7bda88b9a2b5570a9
SHA5122fc3621433c5da3dcb5b9d9133cd9d63d8f53fd60c81ddab8b83bad60efb98942fc38a63dfa98edfc8358c8e4e345a7ec8fa3aa14c18d4337cdd90ea0aed4718
-
Filesize
3.5MB
MD5962cd42457164ee0d2916d9ea208e408
SHA1b1ccc67e7780e57d36479679b4fe5f8ffbe6ae8e
SHA2561845815cd51342d837ca7b2893dc48ca0023d57d2f630069e2157429b6173c04
SHA5122e9904e5389e3e13189805bd074bce2602c8b6c922948287dbc2596e85e30b1c7f0b988217d5ad92aedc6b8f60a12a1b3bf573fbe9880c3429df686c85316555
-
Filesize
3.5MB
MD5962cd42457164ee0d2916d9ea208e408
SHA1b1ccc67e7780e57d36479679b4fe5f8ffbe6ae8e
SHA2561845815cd51342d837ca7b2893dc48ca0023d57d2f630069e2157429b6173c04
SHA5122e9904e5389e3e13189805bd074bce2602c8b6c922948287dbc2596e85e30b1c7f0b988217d5ad92aedc6b8f60a12a1b3bf573fbe9880c3429df686c85316555
-
Filesize
813.1MB
MD55ead844ed21ffc5f5489ed8f97f1ef58
SHA105d6c6105f47977001d003468a06a2a697004735
SHA25641ed328b3a971c04a65ccb6c57f70758c079f479a831b6fa5a4c9ec8edd66eb9
SHA5123b363c41572bdd7a413d31d77c239eebd903018f8013e81b30cd443e905ab53aadd14dd12703ab4f7dfd1c3b7a208b5989026795b6d0b518b36d77ec3fb5a481
-
Filesize
813.1MB
MD55ead844ed21ffc5f5489ed8f97f1ef58
SHA105d6c6105f47977001d003468a06a2a697004735
SHA25641ed328b3a971c04a65ccb6c57f70758c079f479a831b6fa5a4c9ec8edd66eb9
SHA5123b363c41572bdd7a413d31d77c239eebd903018f8013e81b30cd443e905ab53aadd14dd12703ab4f7dfd1c3b7a208b5989026795b6d0b518b36d77ec3fb5a481