Analysis
-
max time kernel
173s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 19:55
Static task
static1
Behavioral task
behavioral1
Sample
9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe
Resource
win7-20230831-en
General
-
Target
9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe
-
Size
1.1MB
-
MD5
4f5afbb97dce44f975c5bd9e17ad63dd
-
SHA1
85604ea7b44e0697c9f49d24c98bd9412656a4bb
-
SHA256
9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92
-
SHA512
726aa5f6509d679408702fe2d4e90d6bdc0095a8359ef978ca45f40491b4ec5b886d1c0fc6e345ffeb1ea70c905dcc568373cc3851a527ac77898ef1e7c5283d
-
SSDEEP
24576:KytQRlo0YHxL+AKIGytIY4bIFwjSW1g6uY/T3:Rtmlo0usIDGjS2g6uYb
Malware Config
Extracted
redline
darts
77.91.124.82:19071
-
auth_value
3c8818da7045365845f15ec0946ebf11
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
resource yara_rule behavioral2/memory/4480-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4480-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4480-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4480-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
resource yara_rule behavioral2/memory/4420-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation t3239196.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation u1753629.exe Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 18 IoCs
pid Process 4928 z9220251.exe 2520 z1924849.exe 1972 z4500119.exe 3360 z7348277.exe 1628 q3322570.exe 4972 r0685645.exe 5020 s7146800.exe 2312 t3239196.exe 1440 explonde.exe 676 u1753629.exe 4116 legota.exe 4632 w6322879.exe 3032 explonde.exe 2364 legota.exe 3808 explonde.exe 1544 legota.exe 4240 explonde.exe 1796 legota.exe -
Loads dropped DLL 2 IoCs
pid Process 2500 rundll32.exe 3916 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z7348277.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9220251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1924849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4500119.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1628 set thread context of 4420 1628 q3322570.exe 96 PID 4972 set thread context of 4480 4972 r0685645.exe 103 PID 5020 set thread context of 3944 5020 s7146800.exe 110 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3972 1628 WerFault.exe 93 2904 4972 WerFault.exe 100 3948 4480 WerFault.exe 103 4776 5020 WerFault.exe 109 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3324 schtasks.exe 3588 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4420 AppLaunch.exe 4420 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4420 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4928 2220 9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe 89 PID 2220 wrote to memory of 4928 2220 9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe 89 PID 2220 wrote to memory of 4928 2220 9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe 89 PID 4928 wrote to memory of 2520 4928 z9220251.exe 90 PID 4928 wrote to memory of 2520 4928 z9220251.exe 90 PID 4928 wrote to memory of 2520 4928 z9220251.exe 90 PID 2520 wrote to memory of 1972 2520 z1924849.exe 91 PID 2520 wrote to memory of 1972 2520 z1924849.exe 91 PID 2520 wrote to memory of 1972 2520 z1924849.exe 91 PID 1972 wrote to memory of 3360 1972 z4500119.exe 92 PID 1972 wrote to memory of 3360 1972 z4500119.exe 92 PID 1972 wrote to memory of 3360 1972 z4500119.exe 92 PID 3360 wrote to memory of 1628 3360 z7348277.exe 93 PID 3360 wrote to memory of 1628 3360 z7348277.exe 93 PID 3360 wrote to memory of 1628 3360 z7348277.exe 93 PID 1628 wrote to memory of 4596 1628 q3322570.exe 94 PID 1628 wrote to memory of 4596 1628 q3322570.exe 94 PID 1628 wrote to memory of 4596 1628 q3322570.exe 94 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 1628 wrote to memory of 4420 1628 q3322570.exe 96 PID 3360 wrote to memory of 4972 3360 z7348277.exe 100 PID 3360 wrote to memory of 4972 3360 z7348277.exe 100 PID 3360 wrote to memory of 4972 3360 z7348277.exe 100 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 4972 wrote to memory of 4480 4972 r0685645.exe 103 PID 1972 wrote to memory of 5020 1972 z4500119.exe 109 PID 1972 wrote to memory of 5020 1972 z4500119.exe 109 PID 1972 wrote to memory of 5020 1972 z4500119.exe 109 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 5020 wrote to memory of 3944 5020 s7146800.exe 110 PID 2520 wrote to memory of 2312 2520 z1924849.exe 113 PID 2520 wrote to memory of 2312 2520 z1924849.exe 113 PID 2520 wrote to memory of 2312 2520 z1924849.exe 113 PID 2312 wrote to memory of 1440 2312 t3239196.exe 114 PID 2312 wrote to memory of 1440 2312 t3239196.exe 114 PID 2312 wrote to memory of 1440 2312 t3239196.exe 114 PID 4928 wrote to memory of 676 4928 z9220251.exe 115 PID 4928 wrote to memory of 676 4928 z9220251.exe 115 PID 4928 wrote to memory of 676 4928 z9220251.exe 115 PID 676 wrote to memory of 4116 676 u1753629.exe 117 PID 676 wrote to memory of 4116 676 u1753629.exe 117 PID 676 wrote to memory of 4116 676 u1753629.exe 117 PID 1440 wrote to memory of 3324 1440 explonde.exe 116 PID 1440 wrote to memory of 3324 1440 explonde.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe"C:\Users\Admin\AppData\Local\Temp\9d2301cdeb694c38ac27f24ef35cf4d29e969b3854bfbe52e6fcf6926427ba92.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9220251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9220251.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924849.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924849.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4500119.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4500119.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7348277.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z7348277.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3322570.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3322570.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 5727⤵
- Program crash
PID:3972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0685645.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r0685645.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 5608⤵
- Program crash
PID:3948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 5527⤵
- Program crash
PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7146800.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s7146800.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 5526⤵
- Program crash
PID:4776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3239196.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t3239196.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:3324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4436
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:2740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:4028
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:860
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:2500
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1753629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u1753629.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4116 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:420
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:2456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:1512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4736
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:3916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6322879.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w6322879.exe2⤵
- Executes dropped EXE
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1628 -ip 16281⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4972 -ip 49721⤵PID:2140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4480 -ip 44801⤵PID:1548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5020 -ip 50201⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3032
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:2364
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:3808
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4240
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:1796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5ae36e79240716df832d3de2d338fb7f1
SHA1238c7f67b8a69262c782e37b71bc5012e7098c22
SHA256192052e5798d299b6ba8a3758cf1bb62a4d6de2d218b26d58fc41fa79af29dca
SHA5127de8aebfa3bbe4e2d2bb092573078537ca610d4efafbeab89df9397ad1d7877dbaa28a12ae222ce5c269f07cb03379b432536dd00b42a0159e2083d354185128
-
Filesize
21KB
MD5ae36e79240716df832d3de2d338fb7f1
SHA1238c7f67b8a69262c782e37b71bc5012e7098c22
SHA256192052e5798d299b6ba8a3758cf1bb62a4d6de2d218b26d58fc41fa79af29dca
SHA5127de8aebfa3bbe4e2d2bb092573078537ca610d4efafbeab89df9397ad1d7877dbaa28a12ae222ce5c269f07cb03379b432536dd00b42a0159e2083d354185128
-
Filesize
985KB
MD5dd80208d117281bf09ba910a59e7c470
SHA15288b41e41ae28b1dfb56da4d43b85d4ed979d7e
SHA256a6b0ee96ee43a43e2652ec83869759e1b87ed4008af76ff97b3f6a63ace5a3c2
SHA512b562b08d57946265f4a5fdf8e3d5bf4f4a526d29a01617da1d99a8295af4c832b2e1d6615ec6889e5e5fdc30dbb67600b2dad4a1f46e2daffaa86e2b150a7d43
-
Filesize
985KB
MD5dd80208d117281bf09ba910a59e7c470
SHA15288b41e41ae28b1dfb56da4d43b85d4ed979d7e
SHA256a6b0ee96ee43a43e2652ec83869759e1b87ed4008af76ff97b3f6a63ace5a3c2
SHA512b562b08d57946265f4a5fdf8e3d5bf4f4a526d29a01617da1d99a8295af4c832b2e1d6615ec6889e5e5fdc30dbb67600b2dad4a1f46e2daffaa86e2b150a7d43
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
802KB
MD58c5fb77bae79a9cd6c38c5a097657fab
SHA1d408857ce537c37790e58b87edd91f5bee85a5e6
SHA25639d7cf1186e08a8ca41471c6e67a09a95f40d95345ed6580a740b9d0f7a049d1
SHA5129e051e3a02ed02bcd91aec3d067a693367549a6b3067275982bc1e3fb1717e621c723672da01a056c5a1b96587558670280937338aacbe12e2879fd114eab0ff
-
Filesize
802KB
MD58c5fb77bae79a9cd6c38c5a097657fab
SHA1d408857ce537c37790e58b87edd91f5bee85a5e6
SHA25639d7cf1186e08a8ca41471c6e67a09a95f40d95345ed6580a740b9d0f7a049d1
SHA5129e051e3a02ed02bcd91aec3d067a693367549a6b3067275982bc1e3fb1717e621c723672da01a056c5a1b96587558670280937338aacbe12e2879fd114eab0ff
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
619KB
MD5057bf5d4032463b4b2f399c6d8a70b40
SHA1866c7d89951468eba151703830f9d95928fd761c
SHA2564c30c085a9d7577ef42282d0b7b704623029c5ef4e109439931d6f3ef4d55647
SHA5120897fac734dab56d25429b6aa739e1dd23fd7954fcfc0ebbc013a7e462c04c598d2ac02ec990fc15127f48acc18602d4c720fb5ece585fa4acb75cd84592bdc3
-
Filesize
619KB
MD5057bf5d4032463b4b2f399c6d8a70b40
SHA1866c7d89951468eba151703830f9d95928fd761c
SHA2564c30c085a9d7577ef42282d0b7b704623029c5ef4e109439931d6f3ef4d55647
SHA5120897fac734dab56d25429b6aa739e1dd23fd7954fcfc0ebbc013a7e462c04c598d2ac02ec990fc15127f48acc18602d4c720fb5ece585fa4acb75cd84592bdc3
-
Filesize
398KB
MD5780783df12af7a7da778236f8e9c63fb
SHA1983cce7fb1f67ef9bbe6db45c68dd0310f45797e
SHA2562a42dff295d4b34ca2356bab4a77efb17a4e16d38100b49bed741a2e938dea1d
SHA512ddc7854b6cf1f22899fdbddd4c8f635e465781ecd18d725e846f1bf21b07c7ee9a18483c0a12da23eac318319d234fd71b6acf0827825c2cf36d6e6c1d11024e
-
Filesize
398KB
MD5780783df12af7a7da778236f8e9c63fb
SHA1983cce7fb1f67ef9bbe6db45c68dd0310f45797e
SHA2562a42dff295d4b34ca2356bab4a77efb17a4e16d38100b49bed741a2e938dea1d
SHA512ddc7854b6cf1f22899fdbddd4c8f635e465781ecd18d725e846f1bf21b07c7ee9a18483c0a12da23eac318319d234fd71b6acf0827825c2cf36d6e6c1d11024e
-
Filesize
348KB
MD5326295a43f3d92215afd08aee8852c09
SHA1adfc4393103273abb45bb0d36d81afa845a64e4f
SHA2565f86eedc7280a44f8b9ee26235346de86ff10ddb318bf01f5c37d92cb1260e10
SHA51297fab3ba412a2270b358474466069e776c00cb0a52c180baf0f93351401671d9a5738f2779a90b44134da253ef60fec22a32335eaa8a05623276d115a54f8ded
-
Filesize
348KB
MD5326295a43f3d92215afd08aee8852c09
SHA1adfc4393103273abb45bb0d36d81afa845a64e4f
SHA2565f86eedc7280a44f8b9ee26235346de86ff10ddb318bf01f5c37d92cb1260e10
SHA51297fab3ba412a2270b358474466069e776c00cb0a52c180baf0f93351401671d9a5738f2779a90b44134da253ef60fec22a32335eaa8a05623276d115a54f8ded
-
Filesize
235KB
MD5438fac09d0ba17d90007af2050973326
SHA1d48a49f47d02d3eb9270efffad6fdb36d9ada1bc
SHA2569afaafc73fe9572e6c78f1d2777b9405d5f9962b5fdaedaa25e7c6ab92f73ebe
SHA51203b3561ceda415d2e6d22edcc82709a1619eaeb4000e0999301c55d60001716ee81c2427b3fd79a6afdaab7be636a48d83a48baf9577fe5d5a90ce7a3d00b7a5
-
Filesize
235KB
MD5438fac09d0ba17d90007af2050973326
SHA1d48a49f47d02d3eb9270efffad6fdb36d9ada1bc
SHA2569afaafc73fe9572e6c78f1d2777b9405d5f9962b5fdaedaa25e7c6ab92f73ebe
SHA51203b3561ceda415d2e6d22edcc82709a1619eaeb4000e0999301c55d60001716ee81c2427b3fd79a6afdaab7be636a48d83a48baf9577fe5d5a90ce7a3d00b7a5
-
Filesize
364KB
MD5f11d1dec6df7994cb4aed7a855f54995
SHA1cfdf9ea5610c6847dac79df30542c79fbfc430fa
SHA2566f642ca41ce03a6d195e1c7a4549dadb0d1598864ef298deb62d131836c612d7
SHA512c511bdfdba5085f5009f254fc8d6b90c6cf7377b3326235e3cee9bc4be53d947f6a2d8926abeb805897ae25888ec15d0cf1f01a24c4882db207fcedd7c7191ab
-
Filesize
364KB
MD5f11d1dec6df7994cb4aed7a855f54995
SHA1cfdf9ea5610c6847dac79df30542c79fbfc430fa
SHA2566f642ca41ce03a6d195e1c7a4549dadb0d1598864ef298deb62d131836c612d7
SHA512c511bdfdba5085f5009f254fc8d6b90c6cf7377b3326235e3cee9bc4be53d947f6a2d8926abeb805897ae25888ec15d0cf1f01a24c4882db207fcedd7c7191ab
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
Filesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0