Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02/06/2024, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe
Resource
win10v2004-20240508-en
General
-
Target
71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe
-
Size
184KB
-
MD5
56b2a57365e053160fec5bebe0830540
-
SHA1
cf40a8f3e47c9f290525a8564c5c714dd2bd9ca9
-
SHA256
71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763
-
SHA512
c0c4ac51c7c327f51898257f39dc83d09630439919495596b9c4495f7d1ddfce848982348aa41bbc805f17823d9a64961aecbb5967c4f2ed7bbc28c4cdcdabbd
-
SSDEEP
3072:9Xr63konGGkCzVXZWPEn8n/zrlvnqWxiuY:9XNoskVX98/zrlPqWxiu
Malware Config
Signatures
-
Executes dropped EXE 31 IoCs
pid Process 2980 Unicorn-22225.exe 764 Unicorn-39521.exe 2364 Unicorn-57165.exe 232 Unicorn-35759.exe 1908 Unicorn-53823.exe 1328 Unicorn-40585.exe 3456 Unicorn-4980.exe 2480 Unicorn-42949.exe 3608 Unicorn-56161.exe 3492 Unicorn-8112.exe 1572 Unicorn-25793.exe 2616 Unicorn-43281.exe 4692 Unicorn-26499.exe 456 Unicorn-13452.exe 4908 Unicorn-57583.exe 2784 Unicorn-9342.exe 2620 Unicorn-26831.exe 4712 Unicorn-32223.exe 4352 Unicorn-49711.exe 4484 Unicorn-37049.exe 220 Unicorn-19727.exe 3792 Unicorn-37407.exe 216 Unicorn-54859.exe 5108 Unicorn-37345.exe 3252 Unicorn-28383.exe 1492 Unicorn-45871.exe 4428 Unicorn-10650.exe 3900 Unicorn-15851.exe 3744 Unicorn-33531.exe 4564 Unicorn-51019.exe 1388 Unicorn-64231.exe -
Program crash 32 IoCs
pid pid_target Process procid_target 1676 976 WerFault.exe 82 4620 2980 WerFault.exe 87 2616 764 WerFault.exe 95 4692 2364 WerFault.exe 99 2040 232 WerFault.exe 104 4948 1908 WerFault.exe 107 2428 1328 WerFault.exe 110 4392 3456 WerFault.exe 113 4308 2480 WerFault.exe 116 4992 3608 WerFault.exe 119 2880 3492 WerFault.exe 123 216 1572 WerFault.exe 126 4784 2616 WerFault.exe 130 4112 4692 WerFault.exe 133 4356 456 WerFault.exe 136 3244 4908 WerFault.exe 139 2408 2784 WerFault.exe 142 3604 2620 WerFault.exe 145 4376 4712 WerFault.exe 148 948 4352 WerFault.exe 151 3540 4484 WerFault.exe 154 3640 220 WerFault.exe 157 4608 3792 WerFault.exe 161 4476 216 WerFault.exe 164 996 5108 WerFault.exe 167 1792 3252 WerFault.exe 170 4908 1492 WerFault.exe 173 4940 4428 WerFault.exe 176 3856 3900 WerFault.exe 179 3576 3744 WerFault.exe 182 4964 1388 WerFault.exe 188 400 4564 WerFault.exe 185 -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 976 71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe 2980 Unicorn-22225.exe 764 Unicorn-39521.exe 2364 Unicorn-57165.exe 232 Unicorn-35759.exe 1908 Unicorn-53823.exe 1328 Unicorn-40585.exe 3456 Unicorn-4980.exe 2480 Unicorn-42949.exe 3608 Unicorn-56161.exe 3492 Unicorn-8112.exe 1572 Unicorn-25793.exe 2616 Unicorn-43281.exe 4692 Unicorn-26499.exe 456 Unicorn-13452.exe 4908 Unicorn-57583.exe 2784 Unicorn-9342.exe 2620 Unicorn-26831.exe 4712 Unicorn-32223.exe 4352 Unicorn-49711.exe 4484 Unicorn-37049.exe 220 Unicorn-19727.exe 3792 Unicorn-37407.exe 216 Unicorn-54859.exe 5108 Unicorn-37345.exe 3252 Unicorn-28383.exe 1492 Unicorn-45871.exe 4428 Unicorn-10650.exe 3900 Unicorn-15851.exe 3744 Unicorn-33531.exe 4564 Unicorn-51019.exe 1388 Unicorn-64231.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 976 wrote to memory of 2980 976 71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe 87 PID 976 wrote to memory of 2980 976 71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe 87 PID 976 wrote to memory of 2980 976 71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe 87 PID 2980 wrote to memory of 764 2980 Unicorn-22225.exe 95 PID 2980 wrote to memory of 764 2980 Unicorn-22225.exe 95 PID 2980 wrote to memory of 764 2980 Unicorn-22225.exe 95 PID 764 wrote to memory of 2364 764 Unicorn-39521.exe 99 PID 764 wrote to memory of 2364 764 Unicorn-39521.exe 99 PID 764 wrote to memory of 2364 764 Unicorn-39521.exe 99 PID 2364 wrote to memory of 232 2364 Unicorn-57165.exe 104 PID 2364 wrote to memory of 232 2364 Unicorn-57165.exe 104 PID 2364 wrote to memory of 232 2364 Unicorn-57165.exe 104 PID 232 wrote to memory of 1908 232 Unicorn-35759.exe 107 PID 232 wrote to memory of 1908 232 Unicorn-35759.exe 107 PID 232 wrote to memory of 1908 232 Unicorn-35759.exe 107 PID 1908 wrote to memory of 1328 1908 Unicorn-53823.exe 110 PID 1908 wrote to memory of 1328 1908 Unicorn-53823.exe 110 PID 1908 wrote to memory of 1328 1908 Unicorn-53823.exe 110 PID 1328 wrote to memory of 3456 1328 Unicorn-40585.exe 113 PID 1328 wrote to memory of 3456 1328 Unicorn-40585.exe 113 PID 1328 wrote to memory of 3456 1328 Unicorn-40585.exe 113 PID 3456 wrote to memory of 2480 3456 Unicorn-4980.exe 116 PID 3456 wrote to memory of 2480 3456 Unicorn-4980.exe 116 PID 3456 wrote to memory of 2480 3456 Unicorn-4980.exe 116 PID 2480 wrote to memory of 3608 2480 Unicorn-42949.exe 119 PID 2480 wrote to memory of 3608 2480 Unicorn-42949.exe 119 PID 2480 wrote to memory of 3608 2480 Unicorn-42949.exe 119 PID 3608 wrote to memory of 3492 3608 Unicorn-56161.exe 123 PID 3608 wrote to memory of 3492 3608 Unicorn-56161.exe 123 PID 3608 wrote to memory of 3492 3608 Unicorn-56161.exe 123 PID 3492 wrote to memory of 1572 3492 Unicorn-8112.exe 126 PID 3492 wrote to memory of 1572 3492 Unicorn-8112.exe 126 PID 3492 wrote to memory of 1572 3492 Unicorn-8112.exe 126 PID 1572 wrote to memory of 2616 1572 Unicorn-25793.exe 130 PID 1572 wrote to memory of 2616 1572 Unicorn-25793.exe 130 PID 1572 wrote to memory of 2616 1572 Unicorn-25793.exe 130 PID 2616 wrote to memory of 4692 2616 Unicorn-43281.exe 133 PID 2616 wrote to memory of 4692 2616 Unicorn-43281.exe 133 PID 2616 wrote to memory of 4692 2616 Unicorn-43281.exe 133 PID 4692 wrote to memory of 456 4692 Unicorn-26499.exe 136 PID 4692 wrote to memory of 456 4692 Unicorn-26499.exe 136 PID 4692 wrote to memory of 456 4692 Unicorn-26499.exe 136 PID 456 wrote to memory of 4908 456 Unicorn-13452.exe 139 PID 456 wrote to memory of 4908 456 Unicorn-13452.exe 139 PID 456 wrote to memory of 4908 456 Unicorn-13452.exe 139 PID 4908 wrote to memory of 2784 4908 Unicorn-57583.exe 142 PID 4908 wrote to memory of 2784 4908 Unicorn-57583.exe 142 PID 4908 wrote to memory of 2784 4908 Unicorn-57583.exe 142 PID 2784 wrote to memory of 2620 2784 Unicorn-9342.exe 145 PID 2784 wrote to memory of 2620 2784 Unicorn-9342.exe 145 PID 2784 wrote to memory of 2620 2784 Unicorn-9342.exe 145 PID 2620 wrote to memory of 4712 2620 Unicorn-26831.exe 148 PID 2620 wrote to memory of 4712 2620 Unicorn-26831.exe 148 PID 2620 wrote to memory of 4712 2620 Unicorn-26831.exe 148 PID 4712 wrote to memory of 4352 4712 Unicorn-32223.exe 151 PID 4712 wrote to memory of 4352 4712 Unicorn-32223.exe 151 PID 4712 wrote to memory of 4352 4712 Unicorn-32223.exe 151 PID 4352 wrote to memory of 4484 4352 Unicorn-49711.exe 154 PID 4352 wrote to memory of 4484 4352 Unicorn-49711.exe 154 PID 4352 wrote to memory of 4484 4352 Unicorn-49711.exe 154 PID 4484 wrote to memory of 220 4484 Unicorn-37049.exe 157 PID 4484 wrote to memory of 220 4484 Unicorn-37049.exe 157 PID 4484 wrote to memory of 220 4484 Unicorn-37049.exe 157 PID 220 wrote to memory of 3792 220 Unicorn-19727.exe 161
Processes
-
C:\Users\Admin\AppData\Local\Temp\71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe"C:\Users\Admin\AppData\Local\Temp\71b938bf24f16621aed288fc52a8e02dd3620fc552c4840388c230257b776763.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22225.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39521.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57165.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35759.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53823.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40585.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4980.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42949.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42949.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56161.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25793.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43281.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26499.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13452.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57583.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9342.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26831.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32223.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49711.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37049.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19727.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37407.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54859.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37345.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28383.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45871.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10650.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10650.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15851.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33531.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51019.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64231.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64231.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 46433⤵
- Program crash
PID:4964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 74432⤵
- Program crash
PID:400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 74431⤵
- Program crash
PID:3576
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 72430⤵
- Program crash
PID:3856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 72429⤵
- Program crash
PID:4940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 74428⤵
- Program crash
PID:4908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 72427⤵
- Program crash
PID:1792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 72426⤵
- Program crash
PID:996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 72425⤵
- Program crash
PID:4476
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 72424⤵
- Program crash
PID:4608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 72423⤵
- Program crash
PID:3640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 74422⤵
- Program crash
PID:3540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 72421⤵
- Program crash
PID:948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 72420⤵
- Program crash
PID:4376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 72419⤵
- Program crash
PID:3604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2784 -s 72418⤵
- Program crash
PID:2408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 72417⤵
- Program crash
PID:3244
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 72416⤵
- Program crash
PID:4356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 72415⤵
- Program crash
PID:4112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 74414⤵
- Program crash
PID:4784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 74013⤵
- Program crash
PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 74412⤵
- Program crash
PID:2880
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 74411⤵
- Program crash
PID:4992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2480 -s 74410⤵
- Program crash
PID:4308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 7449⤵
- Program crash
PID:4392
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 7408⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 7447⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 7246⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 7445⤵
- Program crash
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 7444⤵
- Program crash
PID:2616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 7403⤵
- Program crash
PID:4620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 7282⤵
- Program crash
PID:1676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 976 -ip 9761⤵PID:5100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2980 -ip 29801⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 764 -ip 7641⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2364 -ip 23641⤵PID:3700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 232 -ip 2321⤵PID:1668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1908 -ip 19081⤵PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1328 -ip 13281⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3456 -ip 34561⤵PID:2520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2480 -ip 24801⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3608 -ip 36081⤵PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3492 -ip 34921⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1572 -ip 15721⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2616 -ip 26161⤵PID:2624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4692 -ip 46921⤵PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 456 -ip 4561⤵PID:2956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4908 -ip 49081⤵PID:4432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2784 -ip 27841⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2620 -ip 26201⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4712 -ip 47121⤵PID:2976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4352 -ip 43521⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4484 -ip 44841⤵PID:1980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 220 -ip 2201⤵PID:876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3792 -ip 37921⤵PID:4920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 216 -ip 2161⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 5108 -ip 51081⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3252 -ip 32521⤵PID:4120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1492 -ip 14921⤵PID:1424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4428 -ip 44281⤵PID:3976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3900 -ip 39001⤵PID:3216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3744 -ip 37441⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1388 -ip 13881⤵PID:4076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4564 -ip 45641⤵PID:4844
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD56a9e02ae338460c1db9783e87e3a81ff
SHA1315a6f37b762c1e082aeeac18dccfd545529f504
SHA256a728be3848978f6e1c750c41eddff0f18f667d65cd6c9129c8ca23b14b423a10
SHA512961d2dcf117ecbe29335541f2c2173ba6f7816e1fd3a1cf6cf31dd246a263c8ec01aee43c4a65083216c3202135c77741e68c3e7ae72ac0b61ce247174377888
-
Filesize
184KB
MD53106bd10adf1d2080196364d4d50ac78
SHA1f67d5cd31a76c7c20fed009c1f63d3808cf0cfde
SHA2564c68d726d9b55fc315cfcb5f85850a574b9eaff42f56b0327c7d78cc9fb7e86d
SHA51247824493c7425d5232a6d158f4f9f14d47d746907a79d61015a64f25b1bb696d6b28512014e3f784c5b10c4db3848a4c1e6ec89fc7d709ebea5ca50289a28a7f
-
Filesize
184KB
MD5991914c75495c4beb120fbfe0c82c557
SHA1b7d45cc7642498c53d826bb852a5d3dd5cb61d44
SHA25631099500b6acbcbc72550614394eff5db13a75105834480d10f2c0ab97ae809c
SHA512903352bc91bb5d808a7f8967b9796566006df83dff7b63a0a58051c8f9edcf0882fdd9174f3f92d00f9ea1d531530c5aba602599915649445c8fb3aa807f4a33
-
Filesize
184KB
MD574796d6c86faea165ae2a96a2d709261
SHA10614dc637882aca4f5ff61d450ea75b5a94146f8
SHA256b5d3180d1d57476539ef7ca3c5dffe84948cac3ed0737eab5497de9dc48cff5b
SHA512d663edfde4f2f6c4dbbd630506086b0b417b8d958b8ec9c8cea4d66231c7339439fcb8e4168fc645f195438680b8d79ee3389e3f685908564f85a36d1ab47ca9
-
Filesize
184KB
MD59d046286589f24874fc77914687b2254
SHA1db286cb60d78b1eae969643db7efc01e1d98e3c9
SHA256aa65e03d70ead940a7bcdf6c9ce4f9d36e680a528b7d733bf0599a3b07e540c3
SHA51251fa76c4189e364db5976cb1d91040381de97ea533689c3cfb655b5879af49807f69804648a41ccd7cd755cbc81b8f8a7cefd288d1b90983caafd7cfa9ac6c90
-
Filesize
184KB
MD53921d72f57249fdd3b8a8f55489114dc
SHA11d91fb3c2a1d5a61f867dddb2af4cba11d3010f6
SHA256d2efd22b9ae31307f817afb317b44526ba12b1c135c943656f725a2402c928ed
SHA5124f953dd2644f096344f4f8654f20a8edae7ef80ec4475ed2ac1c167d72d0784db7346f69e3c58322c0f642e3a11ac8fc9f6fd3ef47f8d8d273bda97399739ded
-
Filesize
184KB
MD51771f66a46b583edad4683d4bd310c62
SHA1e554dea3ac33b381b4a62641786078fafba9d364
SHA256608999d2b0e37442277eab35fae10526043ce4280f049e66f2339c6b30bf8d60
SHA512a2d2091005cc9f6edac9d0b5b8fad361bb8365fea99bae6d9619c16d3c569cdb4c75b6f387d8d20f9ee6b4117bd3769a15ae27baa8570e1a5f48fa04009340c5
-
Filesize
184KB
MD5f9ad39732f2ce79d582158b144cf1202
SHA117c9bd1d6dc28fe20bc799c7749dd4a07d22e522
SHA2564de87584259697229fb9401c4d06d362194feb5341a56475a6978a86deaeb815
SHA512d4ba00941c02cd5da08e3b1da3ddeb7ec5f3228a81c102a1ef446371c486cd76c48178bde65644f0589c218e001a0ab1f874e5145444e0e61067c9805a77423b
-
Filesize
184KB
MD5b48ed60508c680bcedd0117d6ee5326a
SHA1f24a8ccef5a77761a7192eee8c679c1586c185ad
SHA256520b1099b1126940790d46c432fc058bf10ee8182809ac420bb46c5368a91d41
SHA5120be84fdc739825c8546f7f890d24865d67a16e9b062b4f4c3cc1de67906ebd1ba8a10ba3c743a0f8c7e90423cb1917a534d99d6d7505501fa4f02b37f7a46e1e
-
Filesize
184KB
MD548a6c11204ae4b3c46666cf5d51d3515
SHA1aa36df5d9b2f6fba913aaca1ff73e984e464fd28
SHA256172381bcb04169a8ea392b3ecfacf0d3be8b6779b734e382494b6e928e0756ba
SHA512c5b95731db68af92d0cbd357cd975e9f293e0267b998ce208317abd7c58542b11951dc2a839f70967dcf0b6b699782ce60a455e48f36833962c82fbbacc235c9
-
Filesize
184KB
MD5861bb6d17221a0519e29f51bcca40d14
SHA16797e4611850bbec20c4b459e55e09066e067766
SHA256e41d315c925a55092f09827be80f2695add2f360cfdb8ef3203ed571e933484b
SHA5120a6a18be33f94a7b328bbce08aee15066bc4d815109cbcf5ed6eee592b1f9462d95b59873e26e9646fc6acf1358d8f08eb27c31f89f75340a0e23760db9dee57
-
Filesize
184KB
MD53e12e3aa8367e5c4662b665deaedd22b
SHA1e4063c395f2a24e73437f864388753b2afeeb5b0
SHA256cda64a83e847e2ee029e01e8f9d49447cd8437a4c76ba190b9055bdcc121392d
SHA51296f093d7c73aaa6c5fc6796f87e6a354f59c188a5349e92824175de6b55223ef1f6dfaf6f64473af9e08fc1cb1de1e333f9c0cda3c6a9da637675a66483d2299
-
Filesize
184KB
MD5a2af781add670f75dd32830d3b9d8e52
SHA1aa118fd7382a163f9aaa97ba5d0854df6ecb46b5
SHA2566861322cac6d1e0a5ed1043fcc57f68db9d942d512945be9dd3a1cf3f6bcab54
SHA512eeadf1f46225147399547a1f22444b1fa6675cc9dc63387f7e06a04d3fac324921426252dfaf5c6ed7a8a003b0ae575c07a6beacb96728594b48928e849cf581
-
Filesize
184KB
MD5b4d61f66cc8dba7ee8904ae0b2946172
SHA14143bcb1fa417eb221833da23b13d532ef996ce2
SHA2564b13da2b218f1cc3af6dc8ca808c56212f614951fb10a2d6b4594266679a1807
SHA512d64bde9bd5686ff3bf910ba0ffcb565c21ea4abe5b4c5b0cb8c4470aef8e97cd9b2d60d90289e081f9caa8c1b46ed979d4a97fdf89e787c433c95c4313f5b69f
-
Filesize
184KB
MD57a15276a0d4f5dd9d1a5567bf724a837
SHA170761f99e647ca531905651d44cd62f9de014af9
SHA256f25472aab4686d3f263f132dc7e8c1b5cbc2e6c0c82574b6388f46e725588c8b
SHA512ca1c329440d7e61ae758d31f15fc92cf36354cf200d087b9a65932c14588846370d4a9cbaef660ac2ac8c1cb2c71dcce6e63f10653af34831114ab09f816d8ac
-
Filesize
184KB
MD59d5e72615c94bea0229009f49d19eeab
SHA1c8f650aa98880c3dcf8bef03bacea8a69843454e
SHA256cb53b8f9062d61796d5897147308de8d31eeaf176497aa52e0f536f3e670e80b
SHA5128afd9a51f7c406de3366f68cf5ba1832d46497454812e1229a1cee0f5c192ea60675eacf7f2e30879cd0dad418c69ff4f4150270c9aeb686d30b7cd908e3bdf3
-
Filesize
184KB
MD5481800033f74d91f672fd19f71879e0e
SHA161ddc9f3242ffd1a3596c254b865e565a56b97e1
SHA256940fbd4cbe1d24fcd756f29dab03f91e825d6314d9b2f1578ec154b50f90f465
SHA51201f02bfed0be525c7b856d578e8809c5cb3902d97a2d7bb81187566d7a2d5d8618c910df0875c0db777dc125aa4e57ecc9f9e66e788907f050d800418ba3b6cf
-
Filesize
184KB
MD516a935469dacf54227b598b1b6c2c559
SHA185dbe56614104c26b50ee46cbbd49de56b493cf0
SHA2561c32d873fd4de47275873c351a573fbe244b35c138e9f64de7a42ab39f301207
SHA512e0c9a85d6d90e123ca04ca910961911c8659049b88c3f03c770fb9a49f392842a47ffdff01adfabb436450c8769e4109af7abb6aadda5c10df32e4fe6930ac58
-
Filesize
184KB
MD5bef8776cad55f0f6d07b69fd9a0b64ae
SHA154f6196db17efc4caa6842d11922d74b4a577782
SHA256b11e7942049c69d54644d11dffaae53f66b905d11eb292a660318d3803cc94a3
SHA51227ab36c3b85aef28c1de20e81c0f409986e1238a0ae08f394d31e4c8b44dcb23f9f6bc5d877eef4e2dc58708fddf6a775db79456eca2532c932e5a752aaeebe1
-
Filesize
184KB
MD5839eeecc98da1e80503464ecbb94dd16
SHA16bb9efc55781dbdd3456c600de99153f82761b7e
SHA2560a9433f77f4f392cbf53a65a66cd976757aeac54afde9ba0799b64cafebcbd2a
SHA512c3f5ea22a23a7da70c2c539d1e87822bb7488bdec731613368a821c3209263f528bb7542ab032624badfcd9fcf74bf31ab52c7581441a4e6228237cd8e464774
-
Filesize
184KB
MD52cd0e689ac4e7ac625fa3aff267482d1
SHA1914c82856ee4bc62ab384322c277b0eb326818ed
SHA2564dc65f50796b9ff1fc81c14e24887283d380949e14d373ebbb1c72c14d7f305d
SHA51224838b7a70a8f7433009493889ffad9ceaea30434c2ad86ddbb6effd8dbf608102add3af66cb183007bcc0690936c5d43c86b2e03cd90915f6a2ac5e47230c18
-
Filesize
184KB
MD59916657107a76716d72d2e42f482ee40
SHA14d09ef26cb146400a51b3935502e13f925c20d4a
SHA25696bf2cbb9f95a13bc1bc9e0432e7ac7b1ef6c9f72460f57a174b3629ea4caf39
SHA5121a82d80e466a86ae93d115bb6c94e7f4a846c87832221f7b28e1069d4f100a35c13a9d1b022b61c619b65486b552fa39a52dbf64bb1ea814e1b90486a78b92a3
-
Filesize
184KB
MD55e9e4849073eddeee79fec774e8d1572
SHA14aec8d0599a1ab5941eb45e08e4699c31758ec72
SHA2560dc31da619ea2d51709f9b6b6e3047cc52c7af4ff75d7c32d1828d64cedc3e15
SHA51271232498bad5f550b3b79404b0de3999938614175620af97d34e37b7926e889a9b5b2f7459cdeb5942b84e3bf04176e562754de21957949c614233858d504c04
-
Filesize
184KB
MD5d03261e68b0debc154e3de332d0c9f96
SHA1e628ec03ba7d0e577fa3a5a52e05269381619e75
SHA256047a856ddc1b2f3b25a6269479837ca83bb523d5ca11c89bbe72818820554166
SHA5122a2ffded97168da7fb76d60752b0fffdd6b9eaaaad0ec4d47a82633667ad03f68f3373acc1e91a7fed16fad67c8f3ee1b208cb8f5da3654fe99705c2838d7b81
-
Filesize
184KB
MD59982d8afddcbeb4f4336ff4b89dfe58e
SHA114845bc05685d35d07bbed907c9ad554bcda05d4
SHA256341cf267ad20d8e4f56c9faf0b31cd323ced59270a000293ae7a6885963057ce
SHA51229759f265a1257db54c6245205927acf53dd9265fac6a635ea12a3598bce1c0c205624784a8a64b139bbb6acab2705d45203ffcad7ad0d335ff52bfdce54ffb6
-
Filesize
184KB
MD5e7c4cf40956b70ad74ed2d2f5a4bffdf
SHA15294021feb59f3439b00657fa37f15a9be6cf8ef
SHA2567f08e747aec8d539743b36dedac516704f094bf08f7a3de7a52883b665739c34
SHA51215fe0705bb9e487074743882d14b13e94aa98e3773b22cb7c23d959677ed40e154ca24cedd03c7bc34350f08a49e99c7d111d8b0e861ada747878cdc1f622eec
-
Filesize
184KB
MD55f1ea9dd54fc2b8cc717eea6e46c1ad6
SHA196fbb4e4a53ca3c8f0cbd7f657cf17f36fd9e609
SHA25623196a0f26c972789b2dfb80dbb7da96f3321137db3f5894f66e7fe62b9fc195
SHA5128620656833690d392166b5465a0a1996fb18d8dbc066b788c80db298dc16b97b19e7dc8a87807b52326642b7593adaa323428e09cb140f36af3ab42aa7510414
-
Filesize
184KB
MD5ffe23b4517a78e9e36af8ede86cb3911
SHA1719f96ea07c4f8ef725b24c403123bb011cab000
SHA256c543d49ac182041191a27818ed0434d48fa6cbecdf85d6a0109448c1fd55246f
SHA5121561f0610f6a3aed1b5980ee298e0fe6225723c7fb1908ba8de3db0712b51a0b8a09137cc16343376def8cd48e4c61d8cf2be36e09471ab116f0033a85ae6374
-
Filesize
184KB
MD57b90b99b459af59fcc11b95e1a2ecc6f
SHA17bf46cd2f050fe1112057f51ab6062affe4ce1ce
SHA256f93c2e967e71c311525d7d75f2caedaf128672e3133576c4076f10c06ac84e05
SHA5122a5e9eec4b4fbc7e9c39c3926c8247ab5d3664895272183eae33f1ecf50cd4a13bd2e6377a125b3986e3c53afa197d2e916dc48f167681e2a41e22c6d0855ecf
-
Filesize
184KB
MD52c12d09e9986079ae14385e64e4c553c
SHA150f73941b38a9c4db62537afa18f04193dda42ae
SHA256d794e76f87b1bd01c734641f8e64b8f24230757b4b1abbf822c3df902eeab8d2
SHA512bdebdda07c475606ad1d376920d630c94216f4db0d37528d97d16b2547b44bfa83906400e026cc39f596c19d16aa767bdaebd6b775f86f397e580bd9fb8a9796
-
Filesize
184KB
MD517e5044dc793e3c1bd0ac80f957c5e67
SHA1f88b3748cf5b59e8d29ab91ba3351b8f257dfc81
SHA256038de3736a7214a936892f14be53d67fb68783a3bd7cfab8919beec5e28ef667
SHA512434a3e2ad17eca989380b80a60fe102aaef1029289137ff60a3c03c2a90c2444c81af362739bce21e2bd4897372504ddc98f203c6e2c98986c3127bc83c2520f