Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
216s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 08:23
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.f9970831c7ef7d9a9b544cff6314f220.exe
-
Size
282KB
-
MD5
f9970831c7ef7d9a9b544cff6314f220
-
SHA1
cce902bcfe531c43c01dec177cfbb14f39521455
-
SHA256
1383f199f9b09d086a731c9a290909a0419e02fc1e12b4d016cb4109de411ede
-
SHA512
186e3b6757c00caa92c03724b514e832c389e6b6c3ae0ae3194e7d08b02de9278e1576205e4a592ef64c5b6e7a9f6dff308a72f85d0724fdb01b366efbf02120
-
SSDEEP
6144:QtnqqrpY8RapeqHSJyoFkaGoZxkEjiPISUOgW9X+hOGzC/:QtnqqrZQQqHSJyoFkaGoZxkmZzcukG2/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation ATDZTU.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation WZVMFLU.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation JDUZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation PHDJW.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation JJH.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation SQATTZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation XYZCR.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation THZRMM.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation XYR.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation NOZEA.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation GZE.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation UDRKCFN.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation NEAS.f9970831c7ef7d9a9b544cff6314f220.exe Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation NVRY.exe -
Executes dropped EXE 13 IoCs
pid Process 2676 PHDJW.exe 3892 NVRY.exe 1620 JJH.exe 2972 THZRMM.exe 2116 ATDZTU.exe 3256 GZE.exe 3804 XYR.exe 3524 WZVMFLU.exe 4248 UDRKCFN.exe 2116 SQATTZ.exe 2720 JDUZ.exe 4208 XYZCR.exe 3004 NOZEA.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\NVRY.exe PHDJW.exe File opened for modification C:\windows\SysWOW64\NVRY.exe PHDJW.exe File created C:\windows\SysWOW64\NVRY.exe.bat PHDJW.exe -
Drops file in Windows directory 39 IoCs
description ioc Process File created C:\windows\PHDJW.exe.bat NEAS.f9970831c7ef7d9a9b544cff6314f220.exe File created C:\windows\system\UDRKCFN.exe WZVMFLU.exe File opened for modification C:\windows\system\XYZCR.exe JDUZ.exe File opened for modification C:\windows\system\ITNGH.exe NOZEA.exe File created C:\windows\system\ATDZTU.exe.bat THZRMM.exe File opened for modification C:\windows\system\UDRKCFN.exe WZVMFLU.exe File opened for modification C:\windows\JDUZ.exe SQATTZ.exe File opened for modification C:\windows\system\XYR.exe GZE.exe File created C:\windows\SQATTZ.exe UDRKCFN.exe File opened for modification C:\windows\NOZEA.exe XYZCR.exe File created C:\windows\system\ITNGH.exe NOZEA.exe File opened for modification C:\windows\system\JJH.exe NVRY.exe File created C:\windows\THZRMM.exe JJH.exe File created C:\windows\GZE.exe ATDZTU.exe File created C:\windows\system\XYR.exe GZE.exe File created C:\windows\system\WZVMFLU.exe XYR.exe File opened for modification C:\windows\PHDJW.exe NEAS.f9970831c7ef7d9a9b544cff6314f220.exe File created C:\windows\system\JJH.exe NVRY.exe File created C:\windows\GZE.exe.bat ATDZTU.exe File created C:\windows\JDUZ.exe SQATTZ.exe File created C:\windows\JDUZ.exe.bat SQATTZ.exe File created C:\windows\system\XYZCR.exe JDUZ.exe File created C:\windows\NOZEA.exe XYZCR.exe File created C:\windows\system\ITNGH.exe.bat NOZEA.exe File created C:\windows\system\ATDZTU.exe THZRMM.exe File opened for modification C:\windows\GZE.exe ATDZTU.exe File created C:\windows\SQATTZ.exe.bat UDRKCFN.exe File opened for modification C:\windows\system\ATDZTU.exe THZRMM.exe File created C:\windows\system\XYR.exe.bat GZE.exe File created C:\windows\system\UDRKCFN.exe.bat WZVMFLU.exe File opened for modification C:\windows\SQATTZ.exe UDRKCFN.exe File created C:\windows\NOZEA.exe.bat XYZCR.exe File created C:\windows\system\JJH.exe.bat NVRY.exe File opened for modification C:\windows\THZRMM.exe JJH.exe File created C:\windows\THZRMM.exe.bat JJH.exe File created C:\windows\PHDJW.exe NEAS.f9970831c7ef7d9a9b544cff6314f220.exe File created C:\windows\system\WZVMFLU.exe.bat XYR.exe File created C:\windows\system\XYZCR.exe.bat JDUZ.exe File opened for modification C:\windows\system\WZVMFLU.exe XYR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2152 3892 WerFault.exe 95 3140 2676 WerFault.exe 85 3704 3996 WerFault.exe 28 1056 1620 WerFault.exe 101 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 2676 PHDJW.exe 2676 PHDJW.exe 3892 NVRY.exe 3892 NVRY.exe 1620 JJH.exe 1620 JJH.exe 2972 THZRMM.exe 2972 THZRMM.exe 2116 ATDZTU.exe 2116 ATDZTU.exe 3256 GZE.exe 3256 GZE.exe 3804 XYR.exe 3804 XYR.exe 3524 WZVMFLU.exe 3524 WZVMFLU.exe 4248 UDRKCFN.exe 4248 UDRKCFN.exe 2116 SQATTZ.exe 2116 SQATTZ.exe 2720 JDUZ.exe 2720 JDUZ.exe 4208 XYZCR.exe 4208 XYZCR.exe 3004 NOZEA.exe 3004 NOZEA.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 2676 PHDJW.exe 2676 PHDJW.exe 3892 NVRY.exe 3892 NVRY.exe 1620 JJH.exe 1620 JJH.exe 2972 THZRMM.exe 2972 THZRMM.exe 2116 ATDZTU.exe 2116 ATDZTU.exe 3256 GZE.exe 3256 GZE.exe 3804 XYR.exe 3804 XYR.exe 3524 WZVMFLU.exe 3524 WZVMFLU.exe 4248 UDRKCFN.exe 4248 UDRKCFN.exe 2116 SQATTZ.exe 2116 SQATTZ.exe 2720 JDUZ.exe 2720 JDUZ.exe 4208 XYZCR.exe 4208 XYZCR.exe 3004 NOZEA.exe 3004 NOZEA.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3996 wrote to memory of 4812 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 82 PID 3996 wrote to memory of 4812 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 82 PID 3996 wrote to memory of 4812 3996 NEAS.f9970831c7ef7d9a9b544cff6314f220.exe 82 PID 4812 wrote to memory of 2676 4812 cmd.exe 85 PID 4812 wrote to memory of 2676 4812 cmd.exe 85 PID 4812 wrote to memory of 2676 4812 cmd.exe 85 PID 2676 wrote to memory of 3908 2676 PHDJW.exe 89 PID 2676 wrote to memory of 3908 2676 PHDJW.exe 89 PID 2676 wrote to memory of 3908 2676 PHDJW.exe 89 PID 3908 wrote to memory of 3892 3908 cmd.exe 95 PID 3908 wrote to memory of 3892 3908 cmd.exe 95 PID 3908 wrote to memory of 3892 3908 cmd.exe 95 PID 3892 wrote to memory of 2536 3892 NVRY.exe 98 PID 3892 wrote to memory of 2536 3892 NVRY.exe 98 PID 3892 wrote to memory of 2536 3892 NVRY.exe 98 PID 2536 wrote to memory of 1620 2536 cmd.exe 101 PID 2536 wrote to memory of 1620 2536 cmd.exe 101 PID 2536 wrote to memory of 1620 2536 cmd.exe 101 PID 1620 wrote to memory of 3184 1620 JJH.exe 107 PID 1620 wrote to memory of 3184 1620 JJH.exe 107 PID 1620 wrote to memory of 3184 1620 JJH.exe 107 PID 3184 wrote to memory of 2972 3184 cmd.exe 109 PID 3184 wrote to memory of 2972 3184 cmd.exe 109 PID 3184 wrote to memory of 2972 3184 cmd.exe 109 PID 2972 wrote to memory of 3736 2972 THZRMM.exe 111 PID 2972 wrote to memory of 3736 2972 THZRMM.exe 111 PID 2972 wrote to memory of 3736 2972 THZRMM.exe 111 PID 3736 wrote to memory of 2116 3736 cmd.exe 114 PID 3736 wrote to memory of 2116 3736 cmd.exe 114 PID 3736 wrote to memory of 2116 3736 cmd.exe 114 PID 2116 wrote to memory of 3756 2116 ATDZTU.exe 115 PID 2116 wrote to memory of 3756 2116 ATDZTU.exe 115 PID 2116 wrote to memory of 3756 2116 ATDZTU.exe 115 PID 3756 wrote to memory of 3256 3756 cmd.exe 118 PID 3756 wrote to memory of 3256 3756 cmd.exe 118 PID 3756 wrote to memory of 3256 3756 cmd.exe 118 PID 3256 wrote to memory of 4036 3256 GZE.exe 119 PID 3256 wrote to memory of 4036 3256 GZE.exe 119 PID 3256 wrote to memory of 4036 3256 GZE.exe 119 PID 4036 wrote to memory of 3804 4036 cmd.exe 122 PID 4036 wrote to memory of 3804 4036 cmd.exe 122 PID 4036 wrote to memory of 3804 4036 cmd.exe 122 PID 3804 wrote to memory of 3128 3804 XYR.exe 123 PID 3804 wrote to memory of 3128 3804 XYR.exe 123 PID 3804 wrote to memory of 3128 3804 XYR.exe 123 PID 3128 wrote to memory of 3524 3128 cmd.exe 126 PID 3128 wrote to memory of 3524 3128 cmd.exe 126 PID 3128 wrote to memory of 3524 3128 cmd.exe 126 PID 3524 wrote to memory of 800 3524 WZVMFLU.exe 127 PID 3524 wrote to memory of 800 3524 WZVMFLU.exe 127 PID 3524 wrote to memory of 800 3524 WZVMFLU.exe 127 PID 800 wrote to memory of 4248 800 cmd.exe 130 PID 800 wrote to memory of 4248 800 cmd.exe 130 PID 800 wrote to memory of 4248 800 cmd.exe 130 PID 4248 wrote to memory of 2900 4248 UDRKCFN.exe 132 PID 4248 wrote to memory of 2900 4248 UDRKCFN.exe 132 PID 4248 wrote to memory of 2900 4248 UDRKCFN.exe 132 PID 2900 wrote to memory of 2116 2900 cmd.exe 136 PID 2900 wrote to memory of 2116 2900 cmd.exe 136 PID 2900 wrote to memory of 2116 2900 cmd.exe 136 PID 2116 wrote to memory of 8 2116 SQATTZ.exe 138 PID 2116 wrote to memory of 8 2116 SQATTZ.exe 138 PID 2116 wrote to memory of 8 2116 SQATTZ.exe 138 PID 8 wrote to memory of 2720 8 cmd.exe 140
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f9970831c7ef7d9a9b544cff6314f220.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PHDJW.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\windows\PHDJW.exeC:\windows\PHDJW.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NVRY.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\windows\SysWOW64\NVRY.exeC:\windows\system32\NVRY.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JJH.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\windows\system\JJH.exeC:\windows\system\JJH.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\THZRMM.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\windows\THZRMM.exeC:\windows\THZRMM.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ATDZTU.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\windows\system\ATDZTU.exeC:\windows\system\ATDZTU.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GZE.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\windows\GZE.exeC:\windows\GZE.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XYR.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\windows\system\XYR.exeC:\windows\system\XYR.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WZVMFLU.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\windows\system\WZVMFLU.exeC:\windows\system\WZVMFLU.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UDRKCFN.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\windows\system\UDRKCFN.exeC:\windows\system\UDRKCFN.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SQATTZ.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\windows\SQATTZ.exeC:\windows\SQATTZ.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JDUZ.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:8 -
C:\windows\JDUZ.exeC:\windows\JDUZ.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XYZCR.exe.bat" "24⤵PID:4112
-
C:\windows\system\XYZCR.exeC:\windows\system\XYZCR.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NOZEA.exe.bat" "26⤵PID:1876
-
C:\windows\NOZEA.exeC:\windows\NOZEA.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ITNGH.exe.bat" "28⤵PID:2008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 9768⤵
- Program crash
PID:1056
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 9606⤵
- Program crash
PID:2152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 9604⤵
- Program crash
PID:3140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 9802⤵
- Program crash
PID:3704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3996 -ip 39961⤵PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2676 -ip 26761⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3892 -ip 38921⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1620 -ip 16201⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 2972 -ip 29721⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 2116 -ip 21161⤵PID:4488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3256 -ip 32561⤵PID:1200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3804 -ip 38041⤵PID:4208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3524 -ip 35241⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4248 -ip 42481⤵PID:4736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2116 -ip 21161⤵PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 2720 -ip 27201⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 4208 -ip 42081⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 768 -p 3004 -ip 30041⤵PID:2984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
282KB
MD5e4d65cdf3f6b8631e9d9caa85dc6d09c
SHA17acff086589222d8ef52c361cf9df692b74b984a
SHA2563ec1111641cef9e5a9f96caeb2fbf388f77a7035fc0561d0ff05980ed0be920b
SHA512359e8efe0719663cad9b670e5e286fb61282be576a627cf7eeadc6b5dbc5d64f7bdc44e9c76967e01e02472a0e59c4cefa9b357cc0f49cb6c5b8e2f7ea166e91
-
Filesize
282KB
MD5ca306e00eb7e3f5da7505ee27e5c7643
SHA1589772d5469b7f18c0ae370c861fa31b13d6b45a
SHA2567fa9f960c3296636992627b19b6edfc4d88dd41d91c400f3807ad6d661c8b762
SHA51219253b4f345e243f1c7340fef619b0aeddf4df49fb86d2c350a5d9b8d566e074431ee45d37ddb915882253f87d80bd63a3b96e42333f9bb86e05b8dc59b94bed
-
Filesize
282KB
MD5e1c5adfc45faf7839d4e3737a3aecef3
SHA1aca43394d5267a6803cccf82a35a5466ecf294dd
SHA256b8e5ddade2c5f2131ff7caa71a31593ac691fb67d56d32d393b29df30bd6764e
SHA5126ca77e904f0f69779d3328f718664566b44c009d17f4fceccf657d0f630eccbdce033a6a902e290a6ba3556bc9b10aa98154737e107c9df8bc53bb8410b3dbfc
-
Filesize
282KB
MD5b851914edd3e75ab59172642a07be874
SHA14d0cbf22f51e19f78ae456dc05cf9160b118c968
SHA256d604cef04c414f4c79c4d58754dde45c9a16a875e63cc8f7e42373672162bcd9
SHA5128aab3736094cce257e92251fe790fb66fe0e6ef74bbbecfe4459e1d5516cf4a30fadfc1e734e5fefe6e42395ae067a7f881013857e8f10b445799d653300e902
-
Filesize
282KB
MD5018da7c49c6ec1fddd0f0c71aec3641b
SHA191cb744c0a8749fcd36640e1953c05746ad9de1a
SHA256b39ed544e49acf4ff644054bc4ae6ee537eb7c5422b254d52b1858083b559436
SHA512d6d1a450d89e025874a4b230e66731fc2bccd8defeba2191da80f90fd5c65d93e9de5ed8b222bd42c1f949969754b5d943446c8cbdba8c022d33a8652fb92a95
-
Filesize
282KB
MD57d916c6ecf46501cc5547e92278b8e6a
SHA1f8c344c086080e2c7e036814bb92e66d2e591a54
SHA256367658c9ffad8db43e20ef42d72941c1bdd1dbba5bc2d4c908e401a21ce84958
SHA512a9e371dda8b71897e96170cddabd2cc8e33686cf1e11ac69b432d47aa3ee9f68dbd3d22974f3b84e561d27caf5965b6853e5ef9db283c4337fbba0eee3d59caf
-
Filesize
282KB
MD535c21ccef39689dcb5c9e75ab24aae10
SHA154873f2a5c9fa76aa995113e5b5bbf3dbe99ef37
SHA256ab1065837d2847433acacbf6a0b15c77a31ce3b5d2f8ef83665680d1f9363a30
SHA51230c3d6af25cbd79e486fa767e53df6ddb529780d9ae62336456f843ef96b8dee4b296cbe6dd704374ed917dcb6f23c9bd91f249e41a34fc7cf85c4f25c35aa97
-
Filesize
282KB
MD59b3c319cde689f964cc752d9a75dde52
SHA16ee95e9363f14565a7c8fcca8e8db300c487b7ea
SHA256a3332606f759e98623ccc622b79f7f9d2e9c15edf0db41f6c373f28f4a960e77
SHA5123f3c49d829fc05b7711f7c8f00e0a454ffce5fdf1909d89c0239c97038bef95d5d1ca56b431d70d0d3e52da44586b1600268696deba82e74beae1c296c8ffbd8
-
Filesize
282KB
MD543b2a6f0db659cfc95dcc8a5512ea803
SHA1cfed468d58b5919079b960c1bbb4f006d6ed3899
SHA256508842f26681c36521b25467713b8041fdb3eca85792fba7f318ae6261816ae0
SHA512bc23e988dc1dbfb262ae8b78e6b109e257e0999ec6008ceac3248bb7d99cf451f85bcd91a0fa2d941a282b3d80ae168d4247fc75863cf9aad5465d60f4e5600e
-
Filesize
282KB
MD508b9a03cdb91cb4d455f436229704f08
SHA17f73e0fc2744abe071187d3cbed44db39eb28f26
SHA2563534a60ac3fd2af3c1c97e6f4a9ad88ebd7b0f6242b5b1274a5540b5d0da7918
SHA512ef5289a461772c1d22322122b8ab61d320f2bfa453ff1a4b926b295a6d0584356aeec620cbb1ddefe1b9f5c52bc17c7e3deb1f5846be5a851b7e6d84cb5030bf
-
Filesize
282KB
MD5b57465c9759541b7259e2cf35b41cb0e
SHA197b2e4cb8be459f8d7ec7a6f74cd0b9ff6f2d8ed
SHA25649b50b41c3d475dbf6e430e5b5b58f14f896e6a8c9d1cb751e9b5d96f38e4d4c
SHA5123b4039bc0b8d261f231bc4a84d983dcfa5a0e2ca32c19ed888de3d7c1b4a52a74df1536f104200dd892db971fc97dcee41eb9198560de73515c2c5578f2c97aa
-
Filesize
282KB
MD56fd86d8f55841b6f211b632ab7a2d56e
SHA1ce9c1eedb570069c6de709a369a2300ff59e01f5
SHA2569a17e4454de9bb4d39219aae8e84eeb64b0864bde62bc3a841f41901d6cce131
SHA51278349ca8c390593fbbd2b26c5726ac23944f803dba2a91fb9c94a5da7c8ee648d1f2b57907d04a1b42c52110e8bcb0bfdf100bd6b7b29fe28b812e41eeb06502
-
Filesize
282KB
MD527f8d4dd5bc2b423f3ff38951bfac66d
SHA1dea5201e43cc71dc01d929f10d09f384e607d0b1
SHA256f09b60f786bc48047f582e5c3a75ba154b83c5c47ff81999f51373ea287c652a
SHA5123e6f83241c5b6f84ad134ef0f23c066c6c2d18714485a4d7405204a57bdaf5a6a79b98c5492273c7e905e37514e87c88784577e6f173cc45c11e418eb1d0977d
-
Filesize
282KB
MD59b30e44086a1c2b5699ee179d85a9fd5
SHA1ffacadb5d4ca9f022523f31d3f89377d73a67d82
SHA256780496e4ea7a7430ac9d67f2ca54b3bfa042ebcc41db79f9ae8f896b44f13ea9
SHA5125513c2ca80105b9fa89ae728a0cd4b466e23cf4a392a26096716d4fe909133dcc06945032ec681b08c84efb8ae87344a49daaac7a9f0fb23b2fac99fdc9ea39c
-
Filesize
282KB
MD5e4d65cdf3f6b8631e9d9caa85dc6d09c
SHA17acff086589222d8ef52c361cf9df692b74b984a
SHA2563ec1111641cef9e5a9f96caeb2fbf388f77a7035fc0561d0ff05980ed0be920b
SHA512359e8efe0719663cad9b670e5e286fb61282be576a627cf7eeadc6b5dbc5d64f7bdc44e9c76967e01e02472a0e59c4cefa9b357cc0f49cb6c5b8e2f7ea166e91
-
Filesize
52B
MD52de2b91ea300955a8c445bd6459ad116
SHA11164b89d6067d712c3a491f32a04ce2293098a2d
SHA256de88ebb5d9e8bc767bb235912a535b7b58947384cf3a08d858545f7966b88261
SHA5125484c51b25ebe524ae7a071c31e6225988ad97343de790da4c3d07f5e8d8408109487586d941035664330c745a75b734505dd77604f704517c5667fc9c14a390
-
Filesize
282KB
MD5ca306e00eb7e3f5da7505ee27e5c7643
SHA1589772d5469b7f18c0ae370c861fa31b13d6b45a
SHA2567fa9f960c3296636992627b19b6edfc4d88dd41d91c400f3807ad6d661c8b762
SHA51219253b4f345e243f1c7340fef619b0aeddf4df49fb86d2c350a5d9b8d566e074431ee45d37ddb915882253f87d80bd63a3b96e42333f9bb86e05b8dc59b94bed
-
Filesize
54B
MD5f4f59e6f5de1feaad576a4c4c350bfc2
SHA139ff88a65a9f086c2b9e33aa053934ac03ffeb8d
SHA256b88c3fbd53f42f38a9dd3758c1a7ab52e0299a73b8485ea5c4d7b1e1f1a5d50d
SHA5124377a386e2bdb9ae12421077f3562e00ec6c8a19201560a4a8e5cc2a217e5bf70ad650ad3e366abbc59b754c861a7a480d1e5d2cdf06bc4573341329ad826e24
-
Filesize
282KB
MD5e1c5adfc45faf7839d4e3737a3aecef3
SHA1aca43394d5267a6803cccf82a35a5466ecf294dd
SHA256b8e5ddade2c5f2131ff7caa71a31593ac691fb67d56d32d393b29df30bd6764e
SHA5126ca77e904f0f69779d3328f718664566b44c009d17f4fceccf657d0f630eccbdce033a6a902e290a6ba3556bc9b10aa98154737e107c9df8bc53bb8410b3dbfc
-
Filesize
56B
MD5d8b355e2cb50dbf5b00dae92d3f74df3
SHA1d9e81ffecd81f334f9cbfd0cb9447fe5fe85239a
SHA2567be6f9b4a16f415abfbb22b6b413b53ccb0304c2e8e6218927ff20a8d2601aeb
SHA5124ab99a46a66116424fdd4c98172e0f9ab7bdfd7b15cd3df2ed3d6fc50320e9c3189cbc6de0f21757717976bbdf95b548bb8cca5ca128dc0ea41a2edf5541c91b
-
Filesize
282KB
MD5b851914edd3e75ab59172642a07be874
SHA14d0cbf22f51e19f78ae456dc05cf9160b118c968
SHA256d604cef04c414f4c79c4d58754dde45c9a16a875e63cc8f7e42373672162bcd9
SHA5128aab3736094cce257e92251fe790fb66fe0e6ef74bbbecfe4459e1d5516cf4a30fadfc1e734e5fefe6e42395ae067a7f881013857e8f10b445799d653300e902
-
Filesize
56B
MD599bbd50cd4bf19adf93feaa81c4a7044
SHA1a142adc663588f3056456d0cfc50d5d2cc9bb6b7
SHA2565616bdfd552b70c3933a6243a8280b916aa1ae7998a1a988af6afb532bc1818f
SHA512138069c8f44296e24bb5beec18e214ad8e52d9f1bfd2758bbb35109297c2e62114010477a23123ba236cfd17eceaaf6b9ff3d850815fd11bc5bf058f52ec52a4
-
Filesize
282KB
MD5018da7c49c6ec1fddd0f0c71aec3641b
SHA191cb744c0a8749fcd36640e1953c05746ad9de1a
SHA256b39ed544e49acf4ff644054bc4ae6ee537eb7c5422b254d52b1858083b559436
SHA512d6d1a450d89e025874a4b230e66731fc2bccd8defeba2191da80f90fd5c65d93e9de5ed8b222bd42c1f949969754b5d943446c8cbdba8c022d33a8652fb92a95
-
Filesize
58B
MD52c35c1cf4a75d636956b80ad1d22ee68
SHA1794292a654f49ef9a825df57efc94c1857315122
SHA256b4c3909d105fe928510a6a2559b777cb856c06394ae88e16d88ed7e84d235265
SHA512c957231cb26afc5d8f1e4f791dc83300e07e0bc583503b81a4091e2f0abafe2090c312d3a6658db9bcf3b2dc1148eef6e5517dc25df57e0d570bafec9b85acab
-
Filesize
282KB
MD535c21ccef39689dcb5c9e75ab24aae10
SHA154873f2a5c9fa76aa995113e5b5bbf3dbe99ef37
SHA256ab1065837d2847433acacbf6a0b15c77a31ce3b5d2f8ef83665680d1f9363a30
SHA51230c3d6af25cbd79e486fa767e53df6ddb529780d9ae62336456f843ef96b8dee4b296cbe6dd704374ed917dcb6f23c9bd91f249e41a34fc7cf85c4f25c35aa97
-
Filesize
72B
MD5024212365f5b03bfd746595d66ba5722
SHA171e4aa567729bc279c232da9ea173e0b7c90a6a9
SHA2566e6190fc9291b89806898e92011d60bd6eb28850650c059461b306ee2c2eaa95
SHA5123160ede01fa96033b85389a2b80a78e90c784cc373cf3a58d2cf0cfbb308f60a1ecc753745b3a9a0059223c1e8fe7d55178d7e96f7d7667a06e96855f2692d3a
-
Filesize
282KB
MD59b30e44086a1c2b5699ee179d85a9fd5
SHA1ffacadb5d4ca9f022523f31d3f89377d73a67d82
SHA256780496e4ea7a7430ac9d67f2ca54b3bfa042ebcc41db79f9ae8f896b44f13ea9
SHA5125513c2ca80105b9fa89ae728a0cd4b466e23cf4a392a26096716d4fe909133dcc06945032ec681b08c84efb8ae87344a49daaac7a9f0fb23b2fac99fdc9ea39c
-
Filesize
58B
MD5663a83936086d1ecaa98f5987ec0c85c
SHA143db1097e3771449ab031a1363d0eded03ecd9cf
SHA256961cb17070e7fbd1620a731676a21368bfdf0e693525fce79a204dae4a6d6200
SHA5120dc74b049ef0a7040e6c1900e5caafc92c531bf0b5f715de649e300f16fe254911c3e6585318ce1b1fc40e64364acb969a52b316205e66f74303893ded0ed08f
-
Filesize
282KB
MD59b3c319cde689f964cc752d9a75dde52
SHA16ee95e9363f14565a7c8fcca8e8db300c487b7ea
SHA256a3332606f759e98623ccc622b79f7f9d2e9c15edf0db41f6c373f28f4a960e77
SHA5123f3c49d829fc05b7711f7c8f00e0a454ffce5fdf1909d89c0239c97038bef95d5d1ca56b431d70d0d3e52da44586b1600268696deba82e74beae1c296c8ffbd8
-
Filesize
72B
MD5d1131575ed15831ccd7e67d4ad591855
SHA1e3b4dcf5c5b9c6787f67d575f34a93dcf4f436ec
SHA256651f6f5c70af656c491bd00c0097ec61b03d6ef8e028ddf696d9a6dc0a607702
SHA512d90f2f1818c8d022886a5d4f7e8ba44877feb1d467b52279c042a9261a6ee7141b1b173a81e20fa46ffffbcf3fcd72362b0fe374117615275da8d296442d240d
-
Filesize
70B
MD5e54567d35fdb3cb6c58f403fb8aa18da
SHA190f0d8202f554c6d39c93aa0bd9d67e301c442de
SHA2562f8718e7a3923b5a27651c322785e1f987fe23cd615bf235ab700c9091f1559c
SHA512491f6da074fc161b4ee2bfcd6452df610796b99429bdf754529f3d8cddb840caffd033601c6ce68d50181bbc8d92de0d61b832996db77187fc0cdb84006eab74
-
Filesize
282KB
MD543b2a6f0db659cfc95dcc8a5512ea803
SHA1cfed468d58b5919079b960c1bbb4f006d6ed3899
SHA256508842f26681c36521b25467713b8041fdb3eca85792fba7f318ae6261816ae0
SHA512bc23e988dc1dbfb262ae8b78e6b109e257e0999ec6008ceac3248bb7d99cf451f85bcd91a0fa2d941a282b3d80ae168d4247fc75863cf9aad5465d60f4e5600e
-
Filesize
66B
MD5cb359f571722c015adb7b9508ce9fb87
SHA1ef84fdace32bd837f7d4baef121c874d97b516fc
SHA256f0808b8838bc567564ac453d665af753f9d7928b06afeb825fcc53ff8cecb2b4
SHA51224c2b27345321add7650c21d17179107f19d0a8f3f8a337a4157caf25f5cc257626b3e5e78f5df7313b6d1d3c78db434d20743d4f146f46c3ac92d315ef09c5a
-
Filesize
282KB
MD508b9a03cdb91cb4d455f436229704f08
SHA17f73e0fc2744abe071187d3cbed44db39eb28f26
SHA2563534a60ac3fd2af3c1c97e6f4a9ad88ebd7b0f6242b5b1274a5540b5d0da7918
SHA512ef5289a461772c1d22322122b8ab61d320f2bfa453ff1a4b926b295a6d0584356aeec620cbb1ddefe1b9f5c52bc17c7e3deb1f5846be5a851b7e6d84cb5030bf
-
Filesize
74B
MD5694343439c91d826f1556296a0e9be65
SHA1f3216c138fdbb8c403570ff58b65582273c8451e
SHA256552b9df6c3d603c13c961f402f7b7f5b0bd6bb9faedad2a5bf374aaafe9f5cfb
SHA512afe15dc3e3d8fc76a5c7ab4e8912b4b1e64473af56cc5dc183af33d0cfc11fdc4368a5ab63b841028d047b03359fbfd0a6a894bebf54e66c5e32ab6d00adcc48
-
Filesize
282KB
MD5b57465c9759541b7259e2cf35b41cb0e
SHA197b2e4cb8be459f8d7ec7a6f74cd0b9ff6f2d8ed
SHA25649b50b41c3d475dbf6e430e5b5b58f14f896e6a8c9d1cb751e9b5d96f38e4d4c
SHA5123b4039bc0b8d261f231bc4a84d983dcfa5a0e2ca32c19ed888de3d7c1b4a52a74df1536f104200dd892db971fc97dcee41eb9198560de73515c2c5578f2c97aa
-
Filesize
74B
MD524f293208d746d2c8b1decc5b36e3e53
SHA187be52a51510af9910c1ee835a405338d2253489
SHA2564ed62976bf16d8cd2b6940ded4ee60f05e0739051efd1f1a403e2a88e184280d
SHA5125b0428f9e159f96d89f1b315b6355780904e0d23fa1c5e0a55397f42e9d951746ca3cf93b6aa400e4db0c736bf445b45f4478fa6cae3ecc3d24e2ad62393c409
-
Filesize
282KB
MD56fd86d8f55841b6f211b632ab7a2d56e
SHA1ce9c1eedb570069c6de709a369a2300ff59e01f5
SHA2569a17e4454de9bb4d39219aae8e84eeb64b0864bde62bc3a841f41901d6cce131
SHA51278349ca8c390593fbbd2b26c5726ac23944f803dba2a91fb9c94a5da7c8ee648d1f2b57907d04a1b42c52110e8bcb0bfdf100bd6b7b29fe28b812e41eeb06502
-
Filesize
66B
MD5ff0165efa1c1201a908f8839a687d063
SHA1980db015abf46e20e9b969760a2a10bc1fce4cd8
SHA2565a6450573ecf4981622016303d2c9bca5284f5168eaeb2f7c507927e9ac7e122
SHA512fc48923f23c25d45bd3b19d2f9d0c4abb9e0ada215486b9cf57fd3ff2986e9baaa45cbda60700a7dc78e587b6a5a93c39e2bd960f4e2cfb626e95858823776af
-
Filesize
282KB
MD527f8d4dd5bc2b423f3ff38951bfac66d
SHA1dea5201e43cc71dc01d929f10d09f384e607d0b1
SHA256f09b60f786bc48047f582e5c3a75ba154b83c5c47ff81999f51373ea287c652a
SHA5123e6f83241c5b6f84ad134ef0f23c066c6c2d18714485a4d7405204a57bdaf5a6a79b98c5492273c7e905e37514e87c88784577e6f173cc45c11e418eb1d0977d
-
Filesize
70B
MD572668c6b2745920489017a22735c121e
SHA18e3520d37f70e2b823f420da9fdf2556e9ed776d
SHA256ceb0cd35487c034da989ad6f6e3ea0bdcaf17b2d1701ae1adcb98160a9fc589d
SHA51246526a7ae4a1cb9aef21878c140a942c107600d5c47505c3111df8cb2b737578e27add3594695584a47e3648e81ec90733b9e758d13206aa9015794b5bd9362c