Analysis
-
max time kernel
25s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 04:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/rootpencariilmu/Redlinestealer2020/blob/main/RedLine.MainPanel-cracked.exe
Resource
win10v2004-20241007-en
General
-
Target
https://github.com/rootpencariilmu/Redlinestealer2020/blob/main/RedLine.MainPanel-cracked.exe
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023d22-143.dat family_redline behavioral1/memory/4456-192-0x0000000000FE0000-0x0000000001084000-memory.dmp family_redline -
Redline family
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
pid Process 4456 RedLine.MainPanel-cracked.exe 2436 RedLine.MainPanel-cracked.exe 3620 RedLine.MainPanel-cracked.exe 1160 RedLine.MainPanel-cracked.exe 4284 RedLine.MainPanel-cracked.exe 3624 RedLine.MainPanel-cracked.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 43 raw.githubusercontent.com 44 raw.githubusercontent.com -
Program crash 6 IoCs
pid pid_target Process procid_target 448 4456 WerFault.exe 118 3620 2436 WerFault.exe 127 4948 3620 WerFault.exe 132 1984 1160 WerFault.exe 135 3624 4284 WerFault.exe 138 2492 3624 WerFault.exe 142 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RedLine.MainPanel-cracked.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings msedge.exe -
NTFS ADS 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 888001.crdownload:SmartScreen msedge.exe File opened for modification C:\Users\Admin\Downloads\Unconfirmed 728381.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 772 msedge.exe 772 msedge.exe 1060 msedge.exe 1060 msedge.exe 2860 identity_helper.exe 2860 identity_helper.exe 2136 msedge.exe 2136 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe 1060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4084 1060 msedge.exe 83 PID 1060 wrote to memory of 4084 1060 msedge.exe 83 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 1124 1060 msedge.exe 84 PID 1060 wrote to memory of 772 1060 msedge.exe 85 PID 1060 wrote to memory of 772 1060 msedge.exe 85 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86 PID 1060 wrote to memory of 1408 1060 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/rootpencariilmu/Redlinestealer2020/blob/main/RedLine.MainPanel-cracked.exe1⤵
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcf3146f8,0x7ffdcf314708,0x7ffdcf3147182⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6040 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:2644
-
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 8163⤵
- Program crash
PID:448
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2856
-
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 7843⤵
- Program crash
PID:3620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,4245058034504956925,15682105445108169287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:1312
-
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 7843⤵
- Program crash
PID:4948
-
-
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 7843⤵
- Program crash
PID:1984
-
-
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 7843⤵
- Program crash
PID:3624
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4456 -ip 44561⤵PID:3372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2436 -ip 24361⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3620 -ip 36201⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1160 -ip 11601⤵PID:1404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4284 -ip 42841⤵PID:3980
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2480
-
C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"C:\Users\Admin\Downloads\RedLine.MainPanel-cracked.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 3562⤵
- Program crash
PID:2492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3624 -ip 36241⤵PID:4208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD50408edbdc5aec12bcee8a7f6670ee69b
SHA15cb0da2eabf5f07f9ade3d45d99b219d7150448a
SHA2567c563431d2b0b1e8aab22a773115370d887061a9032651ebbce38fca411e5daa
SHA512500f492380551838fa21d97bb55dda5bb5c578c9f427a57ee6fe207b1272df84e19e974bcc37e7cde19ff9e5db0e11680bc5e3f3f705728d9731051d9b0c6bd9
-
Filesize
5KB
MD56f83c366e4fbcd29abe10e1d1b12b984
SHA197bdc5624d47248645db39dbb2322f706884527c
SHA2562c4338a29643fe5b3f7d82dbef51cb27ed197c2ea3cefe98235dfbb09bcaa693
SHA5126227a7b4d22eefe043bc451bdc1b673b838b5bcb5d52d37182ef7e239e0db774b15bd0848456fe9760e3ebf660403ea640e10f33e5e3e936ea052c4122f31d35
-
Filesize
6KB
MD59544d6b8676f52fdb1bbc8979a66091b
SHA1750284c61bc3e63cc6e822a2fd8ca472bb3b6c34
SHA2569477a068e0394ac4bcb002115630a1dce2d2dced66121c6456547d2c0db9693b
SHA5124386b02b0301527c60fcdca74da996ab0be033fe398e6be6ce9dd70c11badebfc5152b5f0685a1b890505cec457a33836eb8a651293b9ab669c240c97497a22b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5680dffb287d00f7eecee0fccb751757c
SHA148b740e67f8ab9221f69e33399d974bdaa05d2a3
SHA256b246dddb34b8ad37653a9c7ede740c49906c69d4afd01bfe71ea13718850aee1
SHA512b7fed4eb17adc1f48199f0dd6fa977935f7bc30e2a1e0186b61fa2d25b9640c803c7568bdc0c4f442e70e10dc8cc0aaf943f0d94204b571b46c8801c4f16f41d
-
Filesize
10KB
MD5a887f6dacc94ff47d88981f6f5a0cd34
SHA1b6de3af9290762ff8c929c827af0869951e28ac9
SHA256639d52d18295a278de091ea00a4be1ae6d3ef5741edcdcd8346f93123936ff92
SHA512f3c19a6102975f6e4752ed760b0ab2fbd0abe874d0301b0f55fba4b85be51e04ec5d3ecc012be991805f0f9330c045ec2e8aaf8339d30fea27ab861efc115fa6
-
Filesize
633KB
MD5baf102927947289e4d589028620ce291
SHA15ade9a99a86e5558e5353afa7844229ed23bdcd5
SHA256a6d2d1ba6765e5245b0f62e37d9298e20c913c5a33912b98bd65a76fc5ab28ae
SHA512973ecb034ba18a74c85165df743d9d87168b07539c8ef1d60550171bc0a5766a10b9e6be1425aea203be45b4175694a489ea1b7837faa3b1927ca019492ccd37