Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
1215363ab33e4388037979cc4d051ce5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1215363ab33e4388037979cc4d051ce5.exe
Resource
win10v2004-20230220-en
General
-
Target
1215363ab33e4388037979cc4d051ce5.exe
-
Size
602KB
-
MD5
1215363ab33e4388037979cc4d051ce5
-
SHA1
a96597ad5156e6c92d7e9098bfc7e279e612b366
-
SHA256
6755c42c0b84482aed1334a662b8f834e16272a7330c5910b0f22c1d56828568
-
SHA512
94ec377836b9435a2940c27d04ee426c8b575e5d260780e9fb434ed1b416a5ad0839d85ba7f0a47faad99b9615cf372e3d3775da47be48c873f996d829b8bdc3
-
SSDEEP
12288:NMr6y90ublr+lkJfRLPQxgetlcrwbGVGWxF2L:DylKRFtDGVGf
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l1895834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l1895834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l1895834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l1895834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l1895834.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l1895834.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m5540436.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4284 y3004007.exe 3664 k9760987.exe 4104 l1895834.exe 4100 m5540436.exe 3764 oneetx.exe 2768 oneetx.exe 2496 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2908 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l1895834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l1895834.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3004007.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3004007.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1215363ab33e4388037979cc4d051ce5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1215363ab33e4388037979cc4d051ce5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 29 IoCs
pid pid_target Process procid_target 4680 4100 WerFault.exe 93 4148 4100 WerFault.exe 93 3252 4100 WerFault.exe 93 1388 4100 WerFault.exe 93 3956 4100 WerFault.exe 93 2144 4100 WerFault.exe 93 3900 4100 WerFault.exe 93 3816 4100 WerFault.exe 93 4384 4100 WerFault.exe 93 3596 4100 WerFault.exe 93 2160 3764 WerFault.exe 113 2424 3764 WerFault.exe 113 536 3764 WerFault.exe 113 1488 3764 WerFault.exe 113 1236 3764 WerFault.exe 113 2124 3764 WerFault.exe 113 4392 3764 WerFault.exe 113 4464 3764 WerFault.exe 113 3708 3764 WerFault.exe 113 3752 3764 WerFault.exe 113 2080 3764 WerFault.exe 113 1012 3764 WerFault.exe 113 1792 3764 WerFault.exe 113 1212 2768 WerFault.exe 152 4064 3764 WerFault.exe 113 3988 3764 WerFault.exe 113 4264 3764 WerFault.exe 113 3848 2496 WerFault.exe 162 3748 3764 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3664 k9760987.exe 3664 k9760987.exe 4104 l1895834.exe 4104 l1895834.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3664 k9760987.exe Token: SeDebugPrivilege 4104 l1895834.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4100 m5540436.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5008 wrote to memory of 4284 5008 1215363ab33e4388037979cc4d051ce5.exe 84 PID 5008 wrote to memory of 4284 5008 1215363ab33e4388037979cc4d051ce5.exe 84 PID 5008 wrote to memory of 4284 5008 1215363ab33e4388037979cc4d051ce5.exe 84 PID 4284 wrote to memory of 3664 4284 y3004007.exe 85 PID 4284 wrote to memory of 3664 4284 y3004007.exe 85 PID 4284 wrote to memory of 3664 4284 y3004007.exe 85 PID 4284 wrote to memory of 4104 4284 y3004007.exe 92 PID 4284 wrote to memory of 4104 4284 y3004007.exe 92 PID 4284 wrote to memory of 4104 4284 y3004007.exe 92 PID 5008 wrote to memory of 4100 5008 1215363ab33e4388037979cc4d051ce5.exe 93 PID 5008 wrote to memory of 4100 5008 1215363ab33e4388037979cc4d051ce5.exe 93 PID 5008 wrote to memory of 4100 5008 1215363ab33e4388037979cc4d051ce5.exe 93 PID 4100 wrote to memory of 3764 4100 m5540436.exe 113 PID 4100 wrote to memory of 3764 4100 m5540436.exe 113 PID 4100 wrote to memory of 3764 4100 m5540436.exe 113 PID 3764 wrote to memory of 2008 3764 oneetx.exe 130 PID 3764 wrote to memory of 2008 3764 oneetx.exe 130 PID 3764 wrote to memory of 2008 3764 oneetx.exe 130 PID 3764 wrote to memory of 3336 3764 oneetx.exe 136 PID 3764 wrote to memory of 3336 3764 oneetx.exe 136 PID 3764 wrote to memory of 3336 3764 oneetx.exe 136 PID 3336 wrote to memory of 1524 3336 cmd.exe 140 PID 3336 wrote to memory of 1524 3336 cmd.exe 140 PID 3336 wrote to memory of 1524 3336 cmd.exe 140 PID 3336 wrote to memory of 392 3336 cmd.exe 141 PID 3336 wrote to memory of 392 3336 cmd.exe 141 PID 3336 wrote to memory of 392 3336 cmd.exe 141 PID 3336 wrote to memory of 1112 3336 cmd.exe 142 PID 3336 wrote to memory of 1112 3336 cmd.exe 142 PID 3336 wrote to memory of 1112 3336 cmd.exe 142 PID 3336 wrote to memory of 3360 3336 cmd.exe 143 PID 3336 wrote to memory of 3360 3336 cmd.exe 143 PID 3336 wrote to memory of 3360 3336 cmd.exe 143 PID 3336 wrote to memory of 3584 3336 cmd.exe 144 PID 3336 wrote to memory of 3584 3336 cmd.exe 144 PID 3336 wrote to memory of 3584 3336 cmd.exe 144 PID 3336 wrote to memory of 1264 3336 cmd.exe 145 PID 3336 wrote to memory of 1264 3336 cmd.exe 145 PID 3336 wrote to memory of 1264 3336 cmd.exe 145 PID 3764 wrote to memory of 2908 3764 oneetx.exe 159 PID 3764 wrote to memory of 2908 3764 oneetx.exe 159 PID 3764 wrote to memory of 2908 3764 oneetx.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\1215363ab33e4388037979cc4d051ce5.exe"C:\Users\Admin\AppData\Local\Temp\1215363ab33e4388037979cc4d051ce5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3004007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3004007.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9760987.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9760987.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1895834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1895834.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5540436.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5540436.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 6963⤵
- Program crash
PID:4680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 7803⤵
- Program crash
PID:4148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 8563⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 9603⤵
- Program crash
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 9523⤵
- Program crash
PID:3956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 9523⤵
- Program crash
PID:2144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 12163⤵
- Program crash
PID:3900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 12443⤵
- Program crash
PID:3816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 13203⤵
- Program crash
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 1964⤵
- Program crash
PID:2160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 8404⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9084⤵
- Program crash
PID:536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10524⤵
- Program crash
PID:1488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10724⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10724⤵
- Program crash
PID:2124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 11164⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9964⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 12804⤵
- Program crash
PID:3708
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13164⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 7804⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13004⤵
- Program crash
PID:1012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 13084⤵
- Program crash
PID:1792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 10644⤵
- Program crash
PID:4064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 16124⤵
- Program crash
PID:3988
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 11044⤵
- Program crash
PID:4264
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 16284⤵
- Program crash
PID:3748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4100 -s 7683⤵
- Program crash
PID:3596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4100 -ip 41001⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4100 -ip 41001⤵PID:3916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4100 -ip 41001⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4100 -ip 41001⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4100 -ip 41001⤵PID:2908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4100 -ip 41001⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4100 -ip 41001⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4100 -ip 41001⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4100 -ip 41001⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4100 -ip 41001⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3764 -ip 37641⤵PID:3600
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3764 -ip 37641⤵PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3764 -ip 37641⤵PID:4296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3764 -ip 37641⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3764 -ip 37641⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3764 -ip 37641⤵PID:8
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3764 -ip 37641⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3764 -ip 37641⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 3764 -ip 37641⤵PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3764 -ip 37641⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 3764 -ip 37641⤵PID:2836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3764 -ip 37641⤵PID:4932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 3764 -ip 37641⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 3202⤵
- Program crash
PID:1212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2768 -ip 27681⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3764 -ip 37641⤵PID:2672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3764 -ip 37641⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3764 -ip 37641⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 3162⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2496 -ip 24961⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3764 -ip 37641⤵PID:1928
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
308KB
MD558e40375437bdb395e1bf5c7d9fabee8
SHA13a1ff51174f14b2ee93c9c1ed921c2b3d6a30e8c
SHA256bdd27f03b540ad9d42841b2c324ac1ed3e0d0d4d192edca72f8f186705e5dfd3
SHA512cc11b0bc133be84a2a8c4f20e7ea81df572ab49505a0b25b93ca5d72b219aa94767e8f90d9632271ba8968612d74bb1b047bd19019a8f16abb2cd80738aa85e4
-
Filesize
308KB
MD558e40375437bdb395e1bf5c7d9fabee8
SHA13a1ff51174f14b2ee93c9c1ed921c2b3d6a30e8c
SHA256bdd27f03b540ad9d42841b2c324ac1ed3e0d0d4d192edca72f8f186705e5dfd3
SHA512cc11b0bc133be84a2a8c4f20e7ea81df572ab49505a0b25b93ca5d72b219aa94767e8f90d9632271ba8968612d74bb1b047bd19019a8f16abb2cd80738aa85e4
-
Filesize
168KB
MD59073b782991d4fab11bd12d419452d20
SHA1e98e4c40c8244798e2ece25a3c2ad54d37773132
SHA25610cba2163e2b9399cc3718f9f38221085eae9e2aecffe94dd91914cf11f56e50
SHA5124dd6314e986d643ce3144d6ee3dbdde2b8778d4d628d0292718f2e1f499d9549ac9246ca38e88a86889e5219adaa36cecd7533f25a5eed93dd2d9c3ffa9f9871
-
Filesize
168KB
MD59073b782991d4fab11bd12d419452d20
SHA1e98e4c40c8244798e2ece25a3c2ad54d37773132
SHA25610cba2163e2b9399cc3718f9f38221085eae9e2aecffe94dd91914cf11f56e50
SHA5124dd6314e986d643ce3144d6ee3dbdde2b8778d4d628d0292718f2e1f499d9549ac9246ca38e88a86889e5219adaa36cecd7533f25a5eed93dd2d9c3ffa9f9871
-
Filesize
179KB
MD5c96860ef88c3d70046bc89e0ff948c3b
SHA1c5ce9f096354250d83ba0ec5663c3ec820627c02
SHA25678d68782a59f744c2d0303487abe8bfdc38b27d5698aecd203965aad68278312
SHA512a19759852d804e1a6ee0c1e86d384b682640094019acf5a355d4c83f929e65f8355c917e65995cf36f153cb6f9a5848814d52ecccc65732e3a34509999a005b1
-
Filesize
179KB
MD5c96860ef88c3d70046bc89e0ff948c3b
SHA1c5ce9f096354250d83ba0ec5663c3ec820627c02
SHA25678d68782a59f744c2d0303487abe8bfdc38b27d5698aecd203965aad68278312
SHA512a19759852d804e1a6ee0c1e86d384b682640094019acf5a355d4c83f929e65f8355c917e65995cf36f153cb6f9a5848814d52ecccc65732e3a34509999a005b1
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
349KB
MD544c8ed19ebac0d46fb84d2b78114d8c6
SHA15664dc22c59dc936b8dae727466f42e1318804e0
SHA256ba4ad1181e137621e49b57e4d5f4dde788918276b29dea9686799fa17075df74
SHA51279db828013d8b1a1716a2006cbcf0dd5b462f43f5e1592da1568b25216348659ee53e95ac96e0998f73a38c1c9f6766d92454ad34c6ec7cba8e2ed94c974405b
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5