Analysis
-
max time kernel
188s -
max time network
195s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:25
Static task
static1
Behavioral task
behavioral1
Sample
54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe
Resource
win10v2004-20230220-en
General
-
Target
54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe
-
Size
1.2MB
-
MD5
d5fb730b57b9c2ba513d4482384dea5b
-
SHA1
d276dd4a87c0be18317ac7ce531f72bd7a8eeedd
-
SHA256
54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e
-
SHA512
cf57397b2de119b9be32ca922b72d12fd68ef5113fe80a44af2edf15831a956233949474026998903a89f8c3c275345ee5c2f59ba4d93c61bbdf387ed9ec4b40
-
SSDEEP
24576:3yn2smzBd1f8LQesIpt5QWUUFvpphY9rBC18iDCMVQe4hMHaQ1o:C2smzBd1fqhvQWUUHIrBC1th4hMHa
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4700-155-0x0000000007D20000-0x0000000008338000-memory.dmp redline_stealer behavioral2/memory/4700-161-0x0000000007B30000-0x0000000007B96000-memory.dmp redline_stealer behavioral2/memory/4700-165-0x00000000089F0000-0x0000000008BB2000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7420927.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation j5071264.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation i4111945.exe -
Executes dropped EXE 8 IoCs
pid Process 4316 x1216249.exe 4312 x5217051.exe 4700 g7317973.exe 2732 h7420927.exe 660 i4111945.exe 3948 1.exe 4552 j5071264.exe 224 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7420927.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7420927.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1216249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1216249.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5217051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5217051.exe Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Windows\\Temp\\1.exe" i4111945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 3400 2732 WerFault.exe 88 920 660 WerFault.exe 95 4788 4552 WerFault.exe 99 964 4552 WerFault.exe 99 2132 4552 WerFault.exe 99 3296 4552 WerFault.exe 99 2628 4552 WerFault.exe 99 1576 4552 WerFault.exe 99 4956 4552 WerFault.exe 99 1508 4552 WerFault.exe 99 4444 4552 WerFault.exe 99 1036 4552 WerFault.exe 99 3784 224 WerFault.exe 118 4208 224 WerFault.exe 118 4820 224 WerFault.exe 118 1164 224 WerFault.exe 118 2024 224 WerFault.exe 118 1316 224 WerFault.exe 118 4808 224 WerFault.exe 118 4396 224 WerFault.exe 118 3340 224 WerFault.exe 118 2956 224 WerFault.exe 118 2772 224 WerFault.exe 118 616 224 WerFault.exe 118 528 224 WerFault.exe 118 3016 224 WerFault.exe 118 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4700 g7317973.exe 4700 g7317973.exe 2732 h7420927.exe 2732 h7420927.exe 3948 1.exe 3948 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4700 g7317973.exe Token: SeDebugPrivilege 2732 h7420927.exe Token: SeDebugPrivilege 660 i4111945.exe Token: SeDebugPrivilege 3948 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4552 j5071264.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2996 wrote to memory of 4316 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 82 PID 2996 wrote to memory of 4316 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 82 PID 2996 wrote to memory of 4316 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 82 PID 4316 wrote to memory of 4312 4316 x1216249.exe 83 PID 4316 wrote to memory of 4312 4316 x1216249.exe 83 PID 4316 wrote to memory of 4312 4316 x1216249.exe 83 PID 4312 wrote to memory of 4700 4312 x5217051.exe 84 PID 4312 wrote to memory of 4700 4312 x5217051.exe 84 PID 4312 wrote to memory of 4700 4312 x5217051.exe 84 PID 4312 wrote to memory of 2732 4312 x5217051.exe 88 PID 4312 wrote to memory of 2732 4312 x5217051.exe 88 PID 4312 wrote to memory of 2732 4312 x5217051.exe 88 PID 4316 wrote to memory of 660 4316 x1216249.exe 95 PID 4316 wrote to memory of 660 4316 x1216249.exe 95 PID 4316 wrote to memory of 660 4316 x1216249.exe 95 PID 660 wrote to memory of 3948 660 i4111945.exe 96 PID 660 wrote to memory of 3948 660 i4111945.exe 96 PID 660 wrote to memory of 3948 660 i4111945.exe 96 PID 2996 wrote to memory of 4552 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 99 PID 2996 wrote to memory of 4552 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 99 PID 2996 wrote to memory of 4552 2996 54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe 99 PID 4552 wrote to memory of 224 4552 j5071264.exe 118 PID 4552 wrote to memory of 224 4552 j5071264.exe 118 PID 4552 wrote to memory of 224 4552 j5071264.exe 118 PID 224 wrote to memory of 4852 224 oneetx.exe 137 PID 224 wrote to memory of 4852 224 oneetx.exe 137 PID 224 wrote to memory of 4852 224 oneetx.exe 137 PID 224 wrote to memory of 1852 224 oneetx.exe 143 PID 224 wrote to memory of 1852 224 oneetx.exe 143 PID 224 wrote to memory of 1852 224 oneetx.exe 143 PID 1852 wrote to memory of 3740 1852 cmd.exe 147 PID 1852 wrote to memory of 3740 1852 cmd.exe 147 PID 1852 wrote to memory of 3740 1852 cmd.exe 147 PID 1852 wrote to memory of 940 1852 cmd.exe 148 PID 1852 wrote to memory of 940 1852 cmd.exe 148 PID 1852 wrote to memory of 940 1852 cmd.exe 148 PID 1852 wrote to memory of 1768 1852 cmd.exe 149 PID 1852 wrote to memory of 1768 1852 cmd.exe 149 PID 1852 wrote to memory of 1768 1852 cmd.exe 149 PID 1852 wrote to memory of 4648 1852 cmd.exe 151 PID 1852 wrote to memory of 4648 1852 cmd.exe 151 PID 1852 wrote to memory of 4648 1852 cmd.exe 151 PID 1852 wrote to memory of 3796 1852 cmd.exe 150 PID 1852 wrote to memory of 3796 1852 cmd.exe 150 PID 1852 wrote to memory of 3796 1852 cmd.exe 150 PID 1852 wrote to memory of 2672 1852 cmd.exe 152 PID 1852 wrote to memory of 2672 1852 cmd.exe 152 PID 1852 wrote to memory of 2672 1852 cmd.exe 152
Processes
-
C:\Users\Admin\AppData\Local\Temp\54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe"C:\Users\Admin\AppData\Local\Temp\54259854d6c513fd408a76b03e1d72f326d6c18527c7114358485e936b10353e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1216249.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1216249.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5217051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5217051.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7317973.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g7317973.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7420927.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h7420927.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 10445⤵
- Program crash
PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i4111945.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i4111945.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 660 -s 13764⤵
- Program crash
PID:920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j5071264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j5071264.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 6963⤵
- Program crash
PID:4788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7803⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 7963⤵
- Program crash
PID:2132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9603⤵
- Program crash
PID:3296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9643⤵
- Program crash
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 9643⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 12163⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 12643⤵
- Program crash
PID:1508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 13123⤵
- Program crash
PID:4444
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 6924⤵
- Program crash
PID:3784
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 8764⤵
- Program crash
PID:4208
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 9364⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 8684⤵
- Program crash
PID:1164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 8804⤵
- Program crash
PID:2024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10724⤵
- Program crash
PID:1316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10724⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 8684⤵
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10004⤵
- Program crash
PID:3340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 9044⤵
- Program crash
PID:2956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 7564⤵
- Program crash
PID:2772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 7204⤵
- Program crash
PID:616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 12724⤵
- Program crash
PID:528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 7644⤵
- Program crash
PID:3016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 17563⤵
- Program crash
PID:1036
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2732 -ip 27321⤵PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 660 -ip 6601⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4552 -ip 45521⤵PID:2136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4552 -ip 45521⤵PID:436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4552 -ip 45521⤵PID:4572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4552 -ip 45521⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4552 -ip 45521⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4552 -ip 45521⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4552 -ip 45521⤵PID:3024
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:2964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4552 -ip 45521⤵PID:3192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 224 -ip 2241⤵PID:4512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 224 -ip 2241⤵PID:4212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 224 -ip 2241⤵PID:1776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 224 -ip 2241⤵PID:1504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 224 -ip 2241⤵PID:1676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 224 -ip 2241⤵PID:3236
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 224 -ip 2241⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 224 -ip 2241⤵PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 224 -ip 2241⤵PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 224 -ip 2241⤵PID:4108
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 224 -ip 2241⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 224 -ip 2241⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 224 -ip 2241⤵PID:1816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 224 -ip 2241⤵PID:592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
339KB
MD560428402ffcb3b1c63ad1252e1caea4d
SHA16072bfa4e139c94a7ad07c18fabf50da751b458a
SHA2567467afbe2a1cb7a337c3e980adabb77fbd85d5d24b0461dfd14c81b0798962a2
SHA512a26b48a5cc1631eb17e7c293f0e81da64b6824fd51b32d2a6a6ee894bbcbd3fdbf883c1dc72f1a27d07f33560ac8de1aff6098736fb4837a7249f03a701cdf58
-
Filesize
339KB
MD560428402ffcb3b1c63ad1252e1caea4d
SHA16072bfa4e139c94a7ad07c18fabf50da751b458a
SHA2567467afbe2a1cb7a337c3e980adabb77fbd85d5d24b0461dfd14c81b0798962a2
SHA512a26b48a5cc1631eb17e7c293f0e81da64b6824fd51b32d2a6a6ee894bbcbd3fdbf883c1dc72f1a27d07f33560ac8de1aff6098736fb4837a7249f03a701cdf58
-
Filesize
914KB
MD5aed28560f5941846841aa05dac54a7af
SHA16d668cf7e04ec3a14b9c59d2593c411c7a300768
SHA256836c86a7d1c154524ba89d442224d754dc91035dbf15fd70ddd35cbcf9620386
SHA51246db918360224d17e175c89154ef0c13beaf32268580d97fe5fe719a1e035ab31b9e2223c9f1b07b6a86238370eb79562efe03f04665201a42f46af8b3ddfdf0
-
Filesize
914KB
MD5aed28560f5941846841aa05dac54a7af
SHA16d668cf7e04ec3a14b9c59d2593c411c7a300768
SHA256836c86a7d1c154524ba89d442224d754dc91035dbf15fd70ddd35cbcf9620386
SHA51246db918360224d17e175c89154ef0c13beaf32268580d97fe5fe719a1e035ab31b9e2223c9f1b07b6a86238370eb79562efe03f04665201a42f46af8b3ddfdf0
-
Filesize
547KB
MD5aabd3e285991b4b8cb132185d9ee3a34
SHA12c08b427323341c93550dd8ba9d9441ec0d0f394
SHA256a951292863bd43d59d8ecad9463cef9d55cbcd7c08b1577af9fc568d2eed8953
SHA512babec27518475a1c7a821611be85f1c57db0b5cc6f45fa27de907d7a26502df813672f2bbd249e60d72ff5ed864f5ea24f30ebded25e6ba35a96230cbe4228b7
-
Filesize
547KB
MD5aabd3e285991b4b8cb132185d9ee3a34
SHA12c08b427323341c93550dd8ba9d9441ec0d0f394
SHA256a951292863bd43d59d8ecad9463cef9d55cbcd7c08b1577af9fc568d2eed8953
SHA512babec27518475a1c7a821611be85f1c57db0b5cc6f45fa27de907d7a26502df813672f2bbd249e60d72ff5ed864f5ea24f30ebded25e6ba35a96230cbe4228b7
-
Filesize
416KB
MD5704c2ff62f4c5fea535d194351bcc1d2
SHA134c803cae04b990b6388f7c68622ee8f9eb07b1b
SHA256f54b6c7b964c6347687ca81cbfa21fab18946764e4a54422d4613a33e6f319c8
SHA512df438009e96bac0adf4de3342536ae57f624e9165cc95d32b9d03cf9643f4bdba773d6437909fcdf8697d51891d5d4ff237a534af3494b2e271dfaf737fc81b0
-
Filesize
416KB
MD5704c2ff62f4c5fea535d194351bcc1d2
SHA134c803cae04b990b6388f7c68622ee8f9eb07b1b
SHA256f54b6c7b964c6347687ca81cbfa21fab18946764e4a54422d4613a33e6f319c8
SHA512df438009e96bac0adf4de3342536ae57f624e9165cc95d32b9d03cf9643f4bdba773d6437909fcdf8697d51891d5d4ff237a534af3494b2e271dfaf737fc81b0
-
Filesize
136KB
MD52604496cd8bb25168a2e6bf914975ae0
SHA15f172ad0483fed7a957aa4fa354b68d36f82f9c0
SHA25634bb8fcc25719939e7262ea8494711e31c6942509b151a44db377c1fffef81e3
SHA51222ab4ac10e38689818d87687d0464fa7ed103933326e99922a0ba826fc2dfb8f1b9fb0a6ebda83db7bc3eae53e486b489e15262fedb2fcc49cae3118bd99a901
-
Filesize
136KB
MD52604496cd8bb25168a2e6bf914975ae0
SHA15f172ad0483fed7a957aa4fa354b68d36f82f9c0
SHA25634bb8fcc25719939e7262ea8494711e31c6942509b151a44db377c1fffef81e3
SHA51222ab4ac10e38689818d87687d0464fa7ed103933326e99922a0ba826fc2dfb8f1b9fb0a6ebda83db7bc3eae53e486b489e15262fedb2fcc49cae3118bd99a901
-
Filesize
360KB
MD5db554ce5e1942feb771b54d545842bed
SHA1a3b10fe86fd4d3a585032bb0bf1bc187e9b3c51f
SHA256974e4b8d68ec69b0ee33876ef3b50e5b30fbc970f9a12718a6a984273a85ad61
SHA5128cbac5ae96a39269f60788fa41f54064e54345b54727efe64cf6270b146d913f540859e7a76547e28ecae9e4137918a03e1ebb55031b2801c16d80c0a00ed982
-
Filesize
360KB
MD5db554ce5e1942feb771b54d545842bed
SHA1a3b10fe86fd4d3a585032bb0bf1bc187e9b3c51f
SHA256974e4b8d68ec69b0ee33876ef3b50e5b30fbc970f9a12718a6a984273a85ad61
SHA5128cbac5ae96a39269f60788fa41f54064e54345b54727efe64cf6270b146d913f540859e7a76547e28ecae9e4137918a03e1ebb55031b2801c16d80c0a00ed982
-
Filesize
339KB
MD560428402ffcb3b1c63ad1252e1caea4d
SHA16072bfa4e139c94a7ad07c18fabf50da751b458a
SHA2567467afbe2a1cb7a337c3e980adabb77fbd85d5d24b0461dfd14c81b0798962a2
SHA512a26b48a5cc1631eb17e7c293f0e81da64b6824fd51b32d2a6a6ee894bbcbd3fdbf883c1dc72f1a27d07f33560ac8de1aff6098736fb4837a7249f03a701cdf58
-
Filesize
339KB
MD560428402ffcb3b1c63ad1252e1caea4d
SHA16072bfa4e139c94a7ad07c18fabf50da751b458a
SHA2567467afbe2a1cb7a337c3e980adabb77fbd85d5d24b0461dfd14c81b0798962a2
SHA512a26b48a5cc1631eb17e7c293f0e81da64b6824fd51b32d2a6a6ee894bbcbd3fdbf883c1dc72f1a27d07f33560ac8de1aff6098736fb4837a7249f03a701cdf58
-
Filesize
339KB
MD560428402ffcb3b1c63ad1252e1caea4d
SHA16072bfa4e139c94a7ad07c18fabf50da751b458a
SHA2567467afbe2a1cb7a337c3e980adabb77fbd85d5d24b0461dfd14c81b0798962a2
SHA512a26b48a5cc1631eb17e7c293f0e81da64b6824fd51b32d2a6a6ee894bbcbd3fdbf883c1dc72f1a27d07f33560ac8de1aff6098736fb4837a7249f03a701cdf58
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8
-
Filesize
136KB
MD56b4ad9c773e164effa4804bf294831a7
SHA16a0bfcfaf73aff765b7d515f2527773df326f2cc
SHA256967d69ee61666a88719486692c18ba56a85516035b6b7dacfde589417d3b5c85
SHA512accbdf423c36f8d688adeccfc683c6ac5ab983f6f5461554a1cdbfcd8dfb9cf29bfe75cdf6755dd70fa5c29f0fda4a2119f468dd0c42d80c8d0b0aee1a2137d8