Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2023, 03:41
Static task
static1
General
-
Target
f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe
-
Size
1.0MB
-
MD5
9be94c7b975e556cd5300b423427a3eb
-
SHA1
bb8a5d00597bbbd0da4e8fbf821c5d8e44a533ae
-
SHA256
f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd
-
SHA512
3c18e322d50fba1cabd957f3a971025f727da979ffb9f2a38122c9b5caa63be1bb6cdb5b1b6f8ee5ef92d68e9fbad77d53fff865efcabdce9a071845eadc7b61
-
SSDEEP
24576:kyeR2fg+hg1m+Rvp4jSPPw1iCLFeG8pZKUOyfoIYlPw:zRfS1m+B2jSCiSgpwBFlP
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr289462.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si910282.exe -
Executes dropped EXE 6 IoCs
pid Process 3568 un006643.exe 5076 un744613.exe 1828 pr289462.exe 4348 qu074767.exe 4872 rk528771.exe 2208 si910282.exe -
Loads dropped DLL 1 IoCs
pid Process 3088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr289462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr289462.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un744613.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un006643.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un006643.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un744613.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 31 IoCs
pid pid_target Process procid_target 4288 1828 WerFault.exe 88 5024 4348 WerFault.exe 94 3912 2208 WerFault.exe 98 4852 2208 WerFault.exe 98 1884 2208 WerFault.exe 98 1392 2208 WerFault.exe 98 1896 2208 WerFault.exe 98 3212 2208 WerFault.exe 98 632 2208 WerFault.exe 98 1664 2208 WerFault.exe 98 1736 2208 WerFault.exe 98 5032 2208 WerFault.exe 98 648 4268 WerFault.exe 118 552 4268 WerFault.exe 118 4368 4268 WerFault.exe 118 2144 4268 WerFault.exe 118 4776 4268 WerFault.exe 118 3960 4268 WerFault.exe 118 3312 4268 WerFault.exe 118 2520 4268 WerFault.exe 118 5024 4268 WerFault.exe 118 1336 4268 WerFault.exe 118 3644 4268 WerFault.exe 118 4584 4268 WerFault.exe 118 2024 4268 WerFault.exe 118 3688 4268 WerFault.exe 118 1012 4268 WerFault.exe 118 3932 4268 WerFault.exe 118 2484 4268 WerFault.exe 118 4804 1840 WerFault.exe 167 4524 4268 WerFault.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1828 pr289462.exe 1828 pr289462.exe 4348 qu074767.exe 4348 qu074767.exe 4872 rk528771.exe 4872 rk528771.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1828 pr289462.exe Token: SeDebugPrivilege 4348 qu074767.exe Token: SeDebugPrivilege 4872 rk528771.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3568 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 86 PID 2072 wrote to memory of 3568 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 86 PID 2072 wrote to memory of 3568 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 86 PID 3568 wrote to memory of 5076 3568 un006643.exe 87 PID 3568 wrote to memory of 5076 3568 un006643.exe 87 PID 3568 wrote to memory of 5076 3568 un006643.exe 87 PID 5076 wrote to memory of 1828 5076 un744613.exe 88 PID 5076 wrote to memory of 1828 5076 un744613.exe 88 PID 5076 wrote to memory of 1828 5076 un744613.exe 88 PID 5076 wrote to memory of 4348 5076 un744613.exe 94 PID 5076 wrote to memory of 4348 5076 un744613.exe 94 PID 5076 wrote to memory of 4348 5076 un744613.exe 94 PID 3568 wrote to memory of 4872 3568 un006643.exe 97 PID 3568 wrote to memory of 4872 3568 un006643.exe 97 PID 3568 wrote to memory of 4872 3568 un006643.exe 97 PID 2072 wrote to memory of 2208 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 98 PID 2072 wrote to memory of 2208 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 98 PID 2072 wrote to memory of 2208 2072 f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe 98 PID 4268 wrote to memory of 3344 4268 oneetx.exe 140 PID 4268 wrote to memory of 3344 4268 oneetx.exe 140 PID 4268 wrote to memory of 3344 4268 oneetx.exe 140 PID 4268 wrote to memory of 2512 4268 oneetx.exe 147 PID 4268 wrote to memory of 2512 4268 oneetx.exe 147 PID 4268 wrote to memory of 2512 4268 oneetx.exe 147 PID 2512 wrote to memory of 1204 2512 cmd.exe 151 PID 2512 wrote to memory of 1204 2512 cmd.exe 151 PID 2512 wrote to memory of 1204 2512 cmd.exe 151 PID 2512 wrote to memory of 3744 2512 cmd.exe 152 PID 2512 wrote to memory of 3744 2512 cmd.exe 152 PID 2512 wrote to memory of 3744 2512 cmd.exe 152 PID 2512 wrote to memory of 4084 2512 cmd.exe 153 PID 2512 wrote to memory of 4084 2512 cmd.exe 153 PID 2512 wrote to memory of 4084 2512 cmd.exe 153 PID 2512 wrote to memory of 3992 2512 cmd.exe 154 PID 2512 wrote to memory of 3992 2512 cmd.exe 154 PID 2512 wrote to memory of 3992 2512 cmd.exe 154 PID 2512 wrote to memory of 1980 2512 cmd.exe 155 PID 2512 wrote to memory of 1980 2512 cmd.exe 155 PID 2512 wrote to memory of 1980 2512 cmd.exe 155 PID 2512 wrote to memory of 4576 2512 cmd.exe 156 PID 2512 wrote to memory of 4576 2512 cmd.exe 156 PID 2512 wrote to memory of 4576 2512 cmd.exe 156 PID 4268 wrote to memory of 3088 4268 oneetx.exe 168 PID 4268 wrote to memory of 3088 4268 oneetx.exe 168 PID 4268 wrote to memory of 3088 4268 oneetx.exe 168
Processes
-
C:\Users\Admin\AppData\Local\Temp\f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe"C:\Users\Admin\AppData\Local\Temp\f63ab618040f232da926b1c06b22415136bb66af3c9b9042095f932c59906efd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006643.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un006643.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un744613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un744613.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr289462.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr289462.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 10845⤵
- Program crash
PID:4288
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu074767.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu074767.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 13205⤵
- Program crash
PID:5024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk528771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk528771.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si910282.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si910282.exe2⤵
- Checks computer location settings
- Executes dropped EXE
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6963⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7803⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 8563⤵
- Program crash
PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 9603⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 9803⤵
- Program crash
PID:1896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 9803⤵
- Program crash
PID:3212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 12163⤵
- Program crash
PID:632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 12043⤵
- Program crash
PID:1664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 13163⤵
- Program crash
PID:1736
-
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 6924⤵
- Program crash
PID:648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 9444⤵
- Program crash
PID:552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 10924⤵
- Program crash
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11004⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11084⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11124⤵
- Program crash
PID:3960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11324⤵
- Program crash
PID:3312
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11084⤵
- Program crash
PID:2520
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 10124⤵
- Program crash
PID:5024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12004⤵
- Program crash
PID:1336
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:N"5⤵PID:1980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb7ae701b3" /P "Admin:R" /E5⤵PID:4576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 13284⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 13004⤵
- Program crash
PID:4584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12884⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 12804⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11244⤵
- Program crash
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 16204⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 11324⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 16164⤵
- Program crash
PID:4524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 8643⤵
- Program crash
PID:5032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1828 -ip 18281⤵PID:2016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4348 -ip 43481⤵PID:4528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2208 -ip 22081⤵PID:3880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2208 -ip 22081⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2208 -ip 22081⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2208 -ip 22081⤵PID:4784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2208 -ip 22081⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2208 -ip 22081⤵PID:5088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2208 -ip 22081⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2208 -ip 22081⤵PID:992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2208 -ip 22081⤵PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2208 -ip 22081⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4268 -ip 42681⤵PID:696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4268 -ip 42681⤵PID:3392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4268 -ip 42681⤵PID:1432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4268 -ip 42681⤵PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4268 -ip 42681⤵PID:2368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4268 -ip 42681⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4268 -ip 42681⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4268 -ip 42681⤵PID:3676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4268 -ip 42681⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4268 -ip 42681⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 4268 -ip 42681⤵PID:1300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 4268 -ip 42681⤵PID:4436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4268 -ip 42681⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4268 -ip 42681⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4268 -ip 42681⤵PID:2040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4268 -ip 42681⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exeC:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe1⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 3122⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4268 -ip 42681⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1840 -ip 18401⤵PID:1736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4268 -ip 42681⤵PID:4164
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
370KB
MD547f953425bec8c4bfa27c41c65779f25
SHA1b3c030518edbdb281d30219eeb2ed75c2b71928e
SHA2569a4b04b3766b5e8d30bcd0a45f897e7dc5ccb80db08802a5da6614a868f3f386
SHA51274477edca0b736b3a13d78fa4bef63d1e611c34b0b4df357e1786e4ed44b2755c36a7dfc3e3e5cdd50109c020218087ac98c2e2b479ef406852b3580e0ef6e72
-
Filesize
751KB
MD56cb0e0cbf32606ba031aaa5edbe0f711
SHA195177b5c0b76efc3b0b2da89f69ca3d19667ae11
SHA256c245aa58da2bdf3a1b22adc0559947e83cb0841c29584ac859b276635ef7cd62
SHA512210f854d5a7fb63a27bcc4c3b7c685cf9ee93013af798ffa68107a586b3a9a12b5318bba8a72a9fa2bf83855585a6dc4a51297d5b01c35a8067bbe0fc35e23a1
-
Filesize
751KB
MD56cb0e0cbf32606ba031aaa5edbe0f711
SHA195177b5c0b76efc3b0b2da89f69ca3d19667ae11
SHA256c245aa58da2bdf3a1b22adc0559947e83cb0841c29584ac859b276635ef7cd62
SHA512210f854d5a7fb63a27bcc4c3b7c685cf9ee93013af798ffa68107a586b3a9a12b5318bba8a72a9fa2bf83855585a6dc4a51297d5b01c35a8067bbe0fc35e23a1
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
136KB
MD5ac0ffc4fceebe7be421ae8fc8517d1bf
SHA1fa6a6f1878e561b5401ae36422add3d34cfdf6dd
SHA256fe0c2e45eda219cfb1d2bd132437d2412d84cbe8cc2787dd4ff710e1be5c9718
SHA51223de94ab73fc8cf91d573870d7ac1fb6976eaed31d93e0619378ea93ac5feaf06967bc652525b584bba1b973a2c6e6075b8d7dbe3a8ddf5d569b4e80722bfb93
-
Filesize
597KB
MD515fe3fe834caa33c5fec4b22735cc483
SHA19afed722c03cc8506572ab41f3e0c42b42709c49
SHA2569186c2904b2008bafe7d8bc9963e769ed1ec11c8b343504941c47174136b7c40
SHA5124d91d8bbcff36603f15f39b56404ab5636bf65b8b4d0e91a0a4c790dcd3bd3703dd80811ea63c17e8ddfc56092f39c458a8b4ae46711067eaf32e53679bbf9cc
-
Filesize
597KB
MD515fe3fe834caa33c5fec4b22735cc483
SHA19afed722c03cc8506572ab41f3e0c42b42709c49
SHA2569186c2904b2008bafe7d8bc9963e769ed1ec11c8b343504941c47174136b7c40
SHA5124d91d8bbcff36603f15f39b56404ab5636bf65b8b4d0e91a0a4c790dcd3bd3703dd80811ea63c17e8ddfc56092f39c458a8b4ae46711067eaf32e53679bbf9cc
-
Filesize
391KB
MD5f08d990296a2cc3ee026909bf922e341
SHA162854a9311f14350fd37be99466f9c1a5aa17f72
SHA256d4ca91ab785753ebdd17219393f8d00440b143d833d4211c6f1ff5497144eff6
SHA5124894bc783865dd0f3fa8b6a2c9eca409084c9c4b4a140b15a1577220a18ad79c86da6fefca3eaff315c19ead9f87f688e55165cdbde25bd6ae1b32ad2f105d58
-
Filesize
391KB
MD5f08d990296a2cc3ee026909bf922e341
SHA162854a9311f14350fd37be99466f9c1a5aa17f72
SHA256d4ca91ab785753ebdd17219393f8d00440b143d833d4211c6f1ff5497144eff6
SHA5124894bc783865dd0f3fa8b6a2c9eca409084c9c4b4a140b15a1577220a18ad79c86da6fefca3eaff315c19ead9f87f688e55165cdbde25bd6ae1b32ad2f105d58
-
Filesize
474KB
MD5cc17173b57fcc04aed8207b75282af2b
SHA1d5c8878ba10323bfdd02ecc5436751b63a506099
SHA256d91f1c04f50a08cfdca3211cc84de57912921ef6e6bf10acf814977b4cf3bb51
SHA512c43fa9927a664eb6b202209d256d71356d9d55991150b036b96a16171b0077421d5fcb8b82a7ad9509eb0d9836638675dac9a86f1f1828f419ec8ff9299222f5
-
Filesize
474KB
MD5cc17173b57fcc04aed8207b75282af2b
SHA1d5c8878ba10323bfdd02ecc5436751b63a506099
SHA256d91f1c04f50a08cfdca3211cc84de57912921ef6e6bf10acf814977b4cf3bb51
SHA512c43fa9927a664eb6b202209d256d71356d9d55991150b036b96a16171b0077421d5fcb8b82a7ad9509eb0d9836638675dac9a86f1f1828f419ec8ff9299222f5
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
89KB
MD5f577e9f9bb3716a1405af573fbf2afb4
SHA17e2a18c86e4912f9218fbe7c8cf64e04afb90f6e
SHA2564b3391b13b28318497485a35a26a9c6389ef46eb497f473ff3ec06e0289fdbcb
SHA512fb7791bd8dd6124a657fbf3de52864442a66209540e34a3f085bcb0019937712b3a538e092751baf57bbe9abd6b764e02dc0b214a02492ec4b8459029b0d7add
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5