Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2023, 13:31
Static task
static1
General
-
Target
e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe
-
Size
1.1MB
-
MD5
1a0f8c02b35496fe99b45c422daf4d70
-
SHA1
9caaa3556efbda607ee05753b3992d5236ac0221
-
SHA256
e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5
-
SHA512
9ff0d98930747bb085b8aa0c1f93030305d26f2084f78e45597b1cc7aaffe79aab407e166f70e28c664592bd43d0a9ce3a8bbe4e3c8de0fed274e9252568b502
-
SSDEEP
24576:TygZXIqjBaEcqBw5Ikotp82C7GBF0FEOuGgohQw/r0JbTI:mgWkB/dq92BBFTOuRoh1OT
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr031303.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation si929381.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2564 un364171.exe 1164 un469614.exe 2116 pr031303.exe 3880 qu147613.exe 4028 rk187745.exe 2376 si929381.exe 4928 oneetx.exe 3800 oneetx.exe 1112 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4304 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr031303.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr031303.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un364171.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un469614.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un469614.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un364171.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4324 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
pid pid_target Process procid_target 4624 2116 WerFault.exe 83 2156 3880 WerFault.exe 89 4160 2376 WerFault.exe 93 2296 2376 WerFault.exe 93 4760 2376 WerFault.exe 93 4644 2376 WerFault.exe 93 3720 2376 WerFault.exe 93 1696 2376 WerFault.exe 93 2952 2376 WerFault.exe 93 4260 2376 WerFault.exe 93 4128 2376 WerFault.exe 93 2408 2376 WerFault.exe 93 3120 4928 WerFault.exe 113 4864 4928 WerFault.exe 113 3588 4928 WerFault.exe 113 1976 4928 WerFault.exe 113 4196 4928 WerFault.exe 113 1628 4928 WerFault.exe 113 3820 4928 WerFault.exe 113 4956 4928 WerFault.exe 113 2792 4928 WerFault.exe 113 2152 4928 WerFault.exe 113 2368 4928 WerFault.exe 113 2084 4928 WerFault.exe 113 1252 3800 WerFault.exe 146 2052 4928 WerFault.exe 113 2708 4928 WerFault.exe 113 1708 4928 WerFault.exe 113 3556 1112 WerFault.exe 156 1888 4928 WerFault.exe 113 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2116 pr031303.exe 2116 pr031303.exe 3880 qu147613.exe 3880 qu147613.exe 4028 rk187745.exe 4028 rk187745.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2116 pr031303.exe Token: SeDebugPrivilege 3880 qu147613.exe Token: SeDebugPrivilege 4028 rk187745.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2376 si929381.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2564 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 81 PID 2372 wrote to memory of 2564 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 81 PID 2372 wrote to memory of 2564 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 81 PID 2564 wrote to memory of 1164 2564 un364171.exe 82 PID 2564 wrote to memory of 1164 2564 un364171.exe 82 PID 2564 wrote to memory of 1164 2564 un364171.exe 82 PID 1164 wrote to memory of 2116 1164 un469614.exe 83 PID 1164 wrote to memory of 2116 1164 un469614.exe 83 PID 1164 wrote to memory of 2116 1164 un469614.exe 83 PID 1164 wrote to memory of 3880 1164 un469614.exe 89 PID 1164 wrote to memory of 3880 1164 un469614.exe 89 PID 1164 wrote to memory of 3880 1164 un469614.exe 89 PID 2564 wrote to memory of 4028 2564 un364171.exe 92 PID 2564 wrote to memory of 4028 2564 un364171.exe 92 PID 2564 wrote to memory of 4028 2564 un364171.exe 92 PID 2372 wrote to memory of 2376 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 93 PID 2372 wrote to memory of 2376 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 93 PID 2372 wrote to memory of 2376 2372 e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe 93 PID 2376 wrote to memory of 4928 2376 si929381.exe 113 PID 2376 wrote to memory of 4928 2376 si929381.exe 113 PID 2376 wrote to memory of 4928 2376 si929381.exe 113 PID 4928 wrote to memory of 2668 4928 oneetx.exe 131 PID 4928 wrote to memory of 2668 4928 oneetx.exe 131 PID 4928 wrote to memory of 2668 4928 oneetx.exe 131 PID 4928 wrote to memory of 4304 4928 oneetx.exe 153 PID 4928 wrote to memory of 4304 4928 oneetx.exe 153 PID 4928 wrote to memory of 4304 4928 oneetx.exe 153
Processes
-
C:\Users\Admin\AppData\Local\Temp\e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe"C:\Users\Admin\AppData\Local\Temp\e49ae3f71578d28d982db605d243266a3d8fac13232748c58cd05d9ec2379fb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un364171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un364171.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un469614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un469614.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr031303.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr031303.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 10805⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu147613.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu147613.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 13365⤵
- Program crash
PID:2156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk187745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk187745.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si929381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si929381.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 6963⤵
- Program crash
PID:4160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 7803⤵
- Program crash
PID:2296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 8003⤵
- Program crash
PID:4760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9523⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9563⤵
- Program crash
PID:3720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 9563⤵
- Program crash
PID:1696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 12163⤵
- Program crash
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 12403⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 13163⤵
- Program crash
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 6924⤵
- Program crash
PID:3120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 8324⤵
- Program crash
PID:4864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 8324⤵
- Program crash
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10524⤵
- Program crash
PID:1976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10604⤵
- Program crash
PID:4196
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10604⤵
- Program crash
PID:1628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 11084⤵
- Program crash
PID:3820
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10004⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7724⤵
- Program crash
PID:2792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 7644⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 12604⤵
- Program crash
PID:2368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 14404⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 14484⤵
- Program crash
PID:2052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 16444⤵
- Program crash
PID:2708
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 11364⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 16524⤵
- Program crash
PID:1888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 13643⤵
- Program crash
PID:2408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2116 -ip 21161⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3880 -ip 38801⤵PID:2704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2376 -ip 23761⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2376 -ip 23761⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2376 -ip 23761⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2376 -ip 23761⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2376 -ip 23761⤵PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2376 -ip 23761⤵PID:1748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2376 -ip 23761⤵PID:1888
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2376 -ip 23761⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2376 -ip 23761⤵PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2376 -ip 23761⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4928 -ip 49281⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4928 -ip 49281⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4928 -ip 49281⤵PID:4708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4928 -ip 49281⤵PID:1592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4928 -ip 49281⤵PID:4620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4928 -ip 49281⤵PID:4312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4928 -ip 49281⤵PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4928 -ip 49281⤵PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4928 -ip 49281⤵PID:736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4928 -ip 49281⤵PID:4676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 4928 -ip 49281⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4928 -ip 49281⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 3162⤵
- Program crash
PID:1252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3800 -ip 38001⤵PID:244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4928 -ip 49281⤵PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4928 -ip 49281⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4928 -ip 49281⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 3162⤵
- Program crash
PID:3556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1112 -ip 11121⤵PID:4252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4928 -ip 49281⤵PID:3912
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
395KB
MD551d1dd7c115deda9f7d3b35aaf489a7c
SHA1ff26026a3eaf8ddada6bdb78f1bdaca17498555d
SHA2565ae260d370191e96ceead3b875c7af2acb63e34b091e814f1f0245e0b1180864
SHA5120078a9f3b9761ed03cf66dba91f8a70f22f4f17101ed420e969956678ac67013ef4a08c8a302c5d503c06a92c6f7a6481f2c06a58b2140224fa22aafa106e3c6
-
Filesize
764KB
MD5ceb843efed359345592cd54a3008265c
SHA1ee622a87c5bd12152893033d37b30fa28d63ec79
SHA2564e61efba0866b52f30493865c70667f439c300eaa7cf489e23a5a4f995cf85b2
SHA512470685c625ae200fa3432886a68a0c28f0f96957ea68dd62218406df377fadfd07eef25b0ed7cdb9fa63465d5e041ba992c3ed7ad6e74acf169e4913760ad2cc
-
Filesize
764KB
MD5ceb843efed359345592cd54a3008265c
SHA1ee622a87c5bd12152893033d37b30fa28d63ec79
SHA2564e61efba0866b52f30493865c70667f439c300eaa7cf489e23a5a4f995cf85b2
SHA512470685c625ae200fa3432886a68a0c28f0f96957ea68dd62218406df377fadfd07eef25b0ed7cdb9fa63465d5e041ba992c3ed7ad6e74acf169e4913760ad2cc
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
136KB
MD586810f340795831f3c2bd147981be929
SHA1573345e2c322720fa43f74d761ff1d48028f36c9
SHA256d122c80c89eb529d8edb82af16a9ffd8bb187f391758fe80ac2e25db159a9139
SHA512c50b8b6a424fc20c6a3009560cffc277c8dd99792c97f72bfb57d924efdc07341e87a96cb2556e90955fbab6bd59df2a8fc23f89866096658dc7530499becd9f
-
Filesize
610KB
MD5706d2ef99cb3f9e45fe99cf59f8b0d0d
SHA1124306b9fd398ea74ac8d6d902b8e91fdfcc64fe
SHA2563643f17b7f5b5b62954f9ea54a3273ec280fc5fb1acc04382dd918b98cb7a991
SHA512b0b958a9de4d082e908a352bd6ab516d942b7f92dc42b332355e12d1c6a4e20caaa51242026149e288153f9578ad62c40ca2b5a0be0805ee6b4e01b71b0d306f
-
Filesize
610KB
MD5706d2ef99cb3f9e45fe99cf59f8b0d0d
SHA1124306b9fd398ea74ac8d6d902b8e91fdfcc64fe
SHA2563643f17b7f5b5b62954f9ea54a3273ec280fc5fb1acc04382dd918b98cb7a991
SHA512b0b958a9de4d082e908a352bd6ab516d942b7f92dc42b332355e12d1c6a4e20caaa51242026149e288153f9578ad62c40ca2b5a0be0805ee6b4e01b71b0d306f
-
Filesize
403KB
MD5f8f67ab07e81ebe65741ce8c1c1f8468
SHA135bb685acbeb686270b1531a0f9fa5544d3b19fc
SHA256986544ae708051b959fac935895ff60f50f1db46a63b5137bce406f2de3e824c
SHA512eed8fd470d8b19d25fbd5d7e33e2b52a64e75a44cc17087409d99036ee72989dfa8f339f8d8a67ecfa497aa67ec5480bf6543b58baed2c94978927b8c06e96e3
-
Filesize
403KB
MD5f8f67ab07e81ebe65741ce8c1c1f8468
SHA135bb685acbeb686270b1531a0f9fa5544d3b19fc
SHA256986544ae708051b959fac935895ff60f50f1db46a63b5137bce406f2de3e824c
SHA512eed8fd470d8b19d25fbd5d7e33e2b52a64e75a44cc17087409d99036ee72989dfa8f339f8d8a67ecfa497aa67ec5480bf6543b58baed2c94978927b8c06e96e3
-
Filesize
486KB
MD53489ea4c52cec5a23aa3b007da696313
SHA1cc3b637f3d91e323631ca3358654ac866c176ea5
SHA256c1c183b90d1412379179f6244f38b2f497d0c4422c1cbe80e4a4ab867444a38b
SHA51216b0f7771cb6ac6ea78e247adb9a92779b3c67ebf689f1358b06c3269e8d4862f68299019f4026988b384917bb86aa3f6e39e4a4c62fcd28de11c8da33b774a1
-
Filesize
486KB
MD53489ea4c52cec5a23aa3b007da696313
SHA1cc3b637f3d91e323631ca3358654ac866c176ea5
SHA256c1c183b90d1412379179f6244f38b2f497d0c4422c1cbe80e4a4ab867444a38b
SHA51216b0f7771cb6ac6ea78e247adb9a92779b3c67ebf689f1358b06c3269e8d4862f68299019f4026988b384917bb86aa3f6e39e4a4c62fcd28de11c8da33b774a1
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
89KB
MD5ee69aeae2f96208fc3b11dfb70e07161
SHA15f877b7ca02c4d476f2641bcee9ef5f3a4ab3cf6
SHA25613ce132c49ab6673a4da35eb9ff11d71f1451ad1351417e99cf41db8d2f474d9
SHA51294373fb87b58db0bc0462f1b356897b0919615fe5d8f3ec47f1370b6599261562f7b27e8b0faf46f9cba5fdbabceb67c65557c816bd472d72baa1071d8ee5c6f
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5