Analysis
-
max time kernel
145s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03/05/2023, 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe
Resource
win10v2004-20230220-en
General
-
Target
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe
-
Size
566KB
-
MD5
a2a4adc80226fad0d60301c6c3ecdd6f
-
SHA1
d55457fc76b11412e540ef26379698e59c93540c
-
SHA256
d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640
-
SHA512
b445f35473b6579aab5b4d741374b8eb40b94580ae5c01d796186a6c071ae064ae452852b885ca972ab54ea2bacf4e4ac334629128af872766d33b6a38d3498d
-
SSDEEP
12288:uMrHy90UUGqhHoK+r9qnk4fDq0VkG/owKoc:hyXZmoK+g1q0VksowK3
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l8124879.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l8124879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l8124879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l8124879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l8124879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l8124879.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m3417577.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 4676 y7767959.exe 4616 k8889660.exe 3356 l8124879.exe 1708 m3417577.exe 3492 oneetx.exe 404 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4720 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l8124879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l8124879.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7767959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7767959.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 28 IoCs
pid pid_target Process procid_target 4780 1708 WerFault.exe 95 1284 1708 WerFault.exe 95 1384 1708 WerFault.exe 95 5084 1708 WerFault.exe 95 2152 1708 WerFault.exe 95 4620 1708 WerFault.exe 95 2772 1708 WerFault.exe 95 1936 1708 WerFault.exe 95 3228 1708 WerFault.exe 95 4872 1708 WerFault.exe 95 2240 3492 WerFault.exe 115 224 3492 WerFault.exe 115 3208 3492 WerFault.exe 115 4476 3492 WerFault.exe 115 4028 3492 WerFault.exe 115 3132 3492 WerFault.exe 115 4080 3492 WerFault.exe 115 2888 3492 WerFault.exe 115 3728 3492 WerFault.exe 115 928 3492 WerFault.exe 115 4108 3492 WerFault.exe 115 396 3492 WerFault.exe 115 2236 3492 WerFault.exe 115 660 3492 WerFault.exe 115 2956 404 WerFault.exe 156 2424 3492 WerFault.exe 115 3704 3492 WerFault.exe 115 3428 3492 WerFault.exe 115 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3264 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4616 k8889660.exe 4616 k8889660.exe 3356 l8124879.exe 3356 l8124879.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4616 k8889660.exe Token: SeDebugPrivilege 3356 l8124879.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 m3417577.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5028 wrote to memory of 4676 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 86 PID 5028 wrote to memory of 4676 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 86 PID 5028 wrote to memory of 4676 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 86 PID 4676 wrote to memory of 4616 4676 y7767959.exe 87 PID 4676 wrote to memory of 4616 4676 y7767959.exe 87 PID 4676 wrote to memory of 4616 4676 y7767959.exe 87 PID 4676 wrote to memory of 3356 4676 y7767959.exe 94 PID 4676 wrote to memory of 3356 4676 y7767959.exe 94 PID 4676 wrote to memory of 3356 4676 y7767959.exe 94 PID 5028 wrote to memory of 1708 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 95 PID 5028 wrote to memory of 1708 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 95 PID 5028 wrote to memory of 1708 5028 d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe 95 PID 1708 wrote to memory of 3492 1708 m3417577.exe 115 PID 1708 wrote to memory of 3492 1708 m3417577.exe 115 PID 1708 wrote to memory of 3492 1708 m3417577.exe 115 PID 3492 wrote to memory of 3264 3492 oneetx.exe 132 PID 3492 wrote to memory of 3264 3492 oneetx.exe 132 PID 3492 wrote to memory of 3264 3492 oneetx.exe 132 PID 3492 wrote to memory of 1836 3492 oneetx.exe 138 PID 3492 wrote to memory of 1836 3492 oneetx.exe 138 PID 3492 wrote to memory of 1836 3492 oneetx.exe 138 PID 1836 wrote to memory of 3176 1836 cmd.exe 142 PID 1836 wrote to memory of 3176 1836 cmd.exe 142 PID 1836 wrote to memory of 3176 1836 cmd.exe 142 PID 1836 wrote to memory of 1428 1836 cmd.exe 143 PID 1836 wrote to memory of 1428 1836 cmd.exe 143 PID 1836 wrote to memory of 1428 1836 cmd.exe 143 PID 1836 wrote to memory of 2144 1836 cmd.exe 144 PID 1836 wrote to memory of 2144 1836 cmd.exe 144 PID 1836 wrote to memory of 2144 1836 cmd.exe 144 PID 1836 wrote to memory of 648 1836 cmd.exe 145 PID 1836 wrote to memory of 648 1836 cmd.exe 145 PID 1836 wrote to memory of 648 1836 cmd.exe 145 PID 1836 wrote to memory of 808 1836 cmd.exe 146 PID 1836 wrote to memory of 808 1836 cmd.exe 146 PID 1836 wrote to memory of 808 1836 cmd.exe 146 PID 1836 wrote to memory of 1540 1836 cmd.exe 147 PID 1836 wrote to memory of 1540 1836 cmd.exe 147 PID 1836 wrote to memory of 1540 1836 cmd.exe 147 PID 3492 wrote to memory of 4720 3492 oneetx.exe 161 PID 3492 wrote to memory of 4720 3492 oneetx.exe 161 PID 3492 wrote to memory of 4720 3492 oneetx.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe"C:\Users\Admin\AppData\Local\Temp\d35d6dd5a4c815b11699cf0446730efdf50b0f6b8d1aad5ada00a4cccfd42640.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7767959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7767959.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8889660.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8889660.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8124879.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8124879.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3417577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3417577.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 6963⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 7803⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 8563⤵
- Program crash
PID:1384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 9683⤵
- Program crash
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 9763⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 9763⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 12203⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 12443⤵
- Program crash
PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 13163⤵
- Program crash
PID:3228
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 6924⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 8164⤵
- Program crash
PID:224
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 8684⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10524⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10604⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10604⤵
- Program crash
PID:3132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 11204⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 9924⤵
- Program crash
PID:2888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 7764⤵
- Program crash
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2144
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 12644⤵
- Program crash
PID:928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 7804⤵
- Program crash
PID:4108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 1324⤵
- Program crash
PID:396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 7644⤵
- Program crash
PID:2236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 11124⤵
- Program crash
PID:660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16324⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 15884⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 16684⤵
- Program crash
PID:3428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 13283⤵
- Program crash
PID:4872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1708 -ip 17081⤵PID:3984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1708 -ip 17081⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1708 -ip 17081⤵PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1708 -ip 17081⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1708 -ip 17081⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1708 -ip 17081⤵PID:2052
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1708 -ip 17081⤵PID:2940
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1708 -ip 17081⤵PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 1708 -ip 17081⤵PID:3428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 1708 -ip 17081⤵PID:228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3492 -ip 34921⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3492 -ip 34921⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3492 -ip 34921⤵PID:4616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3492 -ip 34921⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3492 -ip 34921⤵PID:4884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3492 -ip 34921⤵PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3492 -ip 34921⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3492 -ip 34921⤵PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3492 -ip 34921⤵PID:756
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3492 -ip 34921⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3492 -ip 34921⤵PID:4744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3492 -ip 34921⤵PID:868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 3492 -ip 34921⤵PID:2440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3492 -ip 34921⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 3202⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 404 -ip 4041⤵PID:432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3492 -ip 34921⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3492 -ip 34921⤵PID:4716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3492 -ip 34921⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
307KB
MD59a4cf8a6aa3e98d98c9bf9a187cbafb0
SHA14dfd84dd463ccdd8a06bb4faa02058cc1dc26483
SHA2569e97c13eb065ff3457f559731e8006d45e76132c36eca92b22ee38df31efc3f6
SHA512303b23867cf23fcfcdfd6b444a84c7210ebca36fa576a1fb9f58055ee57618040d537f67e3b29e5ad4925cabf08d7bdedcddb656bb87e1f3fe2bc6d073ef4279
-
Filesize
307KB
MD59a4cf8a6aa3e98d98c9bf9a187cbafb0
SHA14dfd84dd463ccdd8a06bb4faa02058cc1dc26483
SHA2569e97c13eb065ff3457f559731e8006d45e76132c36eca92b22ee38df31efc3f6
SHA512303b23867cf23fcfcdfd6b444a84c7210ebca36fa576a1fb9f58055ee57618040d537f67e3b29e5ad4925cabf08d7bdedcddb656bb87e1f3fe2bc6d073ef4279
-
Filesize
168KB
MD5b225c7f94a5806d84ca314485176a3da
SHA1d84f3cf36994d00f50a92a6ecf95b99d17e3ab93
SHA256a76ffcd93704b120b05454684e1ed0bef4d759596dd255714f49d5788421b3b0
SHA5125a254d8e17c22db9090906f060ea9fbe1fbb6de3fe05fc52d4979abb831f29e7a41adc1c1022974801cac2ada858bac3419b1770782a94a21b2fdbbf02832290
-
Filesize
168KB
MD5b225c7f94a5806d84ca314485176a3da
SHA1d84f3cf36994d00f50a92a6ecf95b99d17e3ab93
SHA256a76ffcd93704b120b05454684e1ed0bef4d759596dd255714f49d5788421b3b0
SHA5125a254d8e17c22db9090906f060ea9fbe1fbb6de3fe05fc52d4979abb831f29e7a41adc1c1022974801cac2ada858bac3419b1770782a94a21b2fdbbf02832290
-
Filesize
178KB
MD5a7c5214f8d103ba4896b302d040deaf1
SHA1a947013d38d11c6f4cbb8d2057e6716aab9bd003
SHA256f38cd9be5322e508008d41c232685505276e07f0adf9c4972f926baf324b00d6
SHA512b85b153df373b99dbf01692114cc9b270a95cd4211a077214315c732d9ce48bfd0c9db4a543e61f42166dde4cb7a594c0c34c73f36c2722c93fc6ce17f8d4698
-
Filesize
178KB
MD5a7c5214f8d103ba4896b302d040deaf1
SHA1a947013d38d11c6f4cbb8d2057e6716aab9bd003
SHA256f38cd9be5322e508008d41c232685505276e07f0adf9c4972f926baf324b00d6
SHA512b85b153df373b99dbf01692114cc9b270a95cd4211a077214315c732d9ce48bfd0c9db4a543e61f42166dde4cb7a594c0c34c73f36c2722c93fc6ce17f8d4698
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
268KB
MD5050ece8d8ce07171391f06aaf6dfd3b8
SHA1949ca6b9d274dd52c0a4172d495ce75463d23418
SHA256d5b9738888f2b39c9af23b69fd70bae85c29be599ea8064dc4d4c87d24281da2
SHA5127ea607c81f8208ade90eed3c2285048ae4be87143e1bf8abe8af6f78c6c57edd5be8eb505eaddc92e1dadccd412bfad2e84769ba6d02e47cc77151da9c69adae
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5