Analysis
-
max time kernel
25s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe
-
Size
184KB
-
MD5
46b4f383098048ed55a568ab2727dd30
-
SHA1
9675924019b4dacd1a6ab38d938355c259b9a1b5
-
SHA256
3a110c2d4dda8020f4df64d0749a3cf0c19fb7c0cba4929696f55804e662ecf5
-
SHA512
47b5283d99ec07f819c02e28456383c2310cfaa19ec801681231c4ef254d81ae8e8262e0e3abc0ab930bb3fae5432d480c6f9dbf2447c0284d8b31f42868b7ff
-
SSDEEP
3072:M85EPYos7hg5Tq/yyWK7b2Kl1vnq/6guN:M8Vo/pq/n7CKl1Pq/6gu
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 2768 Unicorn-39285.exe 3800 Unicorn-18045.exe 364 Unicorn-59757.exe 1412 Unicorn-3164.exe 1768 Unicorn-46413.exe 2968 Unicorn-14420.exe 540 Unicorn-34213.exe 3768 Unicorn-18557.exe -
Program crash 47 IoCs
pid pid_target Process procid_target 5116 1900 WerFault.exe 81 3972 2768 WerFault.exe 88 1384 3800 WerFault.exe 94 1636 364 WerFault.exe 99 3628 1412 WerFault.exe 102 2056 1768 WerFault.exe 105 4948 2968 WerFault.exe 108 3292 540 WerFault.exe 111 216 3768 WerFault.exe 114 4532 728 WerFault.exe 117 4956 3008 WerFault.exe 121 3632 1744 WerFault.exe 124 1236 4536 WerFault.exe 127 4052 4972 WerFault.exe 130 1268 4636 WerFault.exe 133 1156 772 WerFault.exe 136 3252 2896 WerFault.exe 139 920 1636 WerFault.exe 142 1692 3192 WerFault.exe 145 2588 4780 WerFault.exe 148 4692 4708 WerFault.exe 151 2824 2968 WerFault.exe 154 3508 4196 WerFault.exe 157 4136 612 WerFault.exe 160 2976 4404 WerFault.exe 163 1032 1072 WerFault.exe 166 4428 3124 WerFault.exe 169 4936 2864 WerFault.exe 172 844 1532 WerFault.exe 175 3752 3296 WerFault.exe 178 3184 3972 WerFault.exe 181 468 1384 WerFault.exe 184 5096 632 WerFault.exe 187 1412 4016 WerFault.exe 190 1768 2220 WerFault.exe 193 4780 3192 WerFault.exe 196 4724 1616 WerFault.exe 199 968 3168 WerFault.exe 202 3944 2560 WerFault.exe 205 3428 3880 WerFault.exe 208 1452 2180 WerFault.exe 211 5012 3460 WerFault.exe 214 2812 2332 WerFault.exe 217 1396 1588 WerFault.exe 220 1236 1060 WerFault.exe 223 3764 2104 WerFault.exe 226 1512 4864 WerFault.exe 229 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1900 46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe 2768 Unicorn-39285.exe 3800 Unicorn-18045.exe 364 Unicorn-59757.exe 1412 Unicorn-3164.exe 1768 Unicorn-46413.exe 2968 Unicorn-14420.exe 540 Unicorn-34213.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2768 1900 46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe 88 PID 1900 wrote to memory of 2768 1900 46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe 88 PID 1900 wrote to memory of 2768 1900 46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe 88 PID 2768 wrote to memory of 3800 2768 Unicorn-39285.exe 94 PID 2768 wrote to memory of 3800 2768 Unicorn-39285.exe 94 PID 2768 wrote to memory of 3800 2768 Unicorn-39285.exe 94 PID 3800 wrote to memory of 364 3800 Unicorn-18045.exe 99 PID 3800 wrote to memory of 364 3800 Unicorn-18045.exe 99 PID 3800 wrote to memory of 364 3800 Unicorn-18045.exe 99 PID 364 wrote to memory of 1412 364 Unicorn-59757.exe 102 PID 364 wrote to memory of 1412 364 Unicorn-59757.exe 102 PID 364 wrote to memory of 1412 364 Unicorn-59757.exe 102 PID 1412 wrote to memory of 1768 1412 Unicorn-3164.exe 105 PID 1412 wrote to memory of 1768 1412 Unicorn-3164.exe 105 PID 1412 wrote to memory of 1768 1412 Unicorn-3164.exe 105 PID 1768 wrote to memory of 2968 1768 Unicorn-46413.exe 154 PID 1768 wrote to memory of 2968 1768 Unicorn-46413.exe 154 PID 1768 wrote to memory of 2968 1768 Unicorn-46413.exe 154 PID 2968 wrote to memory of 540 2968 Unicorn-14420.exe 111 PID 2968 wrote to memory of 540 2968 Unicorn-14420.exe 111 PID 2968 wrote to memory of 540 2968 Unicorn-14420.exe 111 PID 540 wrote to memory of 3768 540 Unicorn-34213.exe 114 PID 540 wrote to memory of 3768 540 Unicorn-34213.exe 114 PID 540 wrote to memory of 3768 540 Unicorn-34213.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\46b4f383098048ed55a568ab2727dd30_NeikiAnalytics.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39285.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18045.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59757.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3164.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46413.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14420.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34213.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18557.exe9⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2900.exe10⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52781.exe11⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46829.exe12⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35293.exe13⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19637.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19637.exe14⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23428.exe15⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14403.exe16⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19204.exe17⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60916.exe18⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54964.exe19⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47476.exe20⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39988.exe21⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3947.exe22⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35956.exe23⤵PID:4196
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3963.exe24⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4739.exe25⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47988.exe26⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44620.exe27⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20796.exe28⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11771.exe29⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4283.exe30⤵PID:3296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9083.exe31⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1595.exe32⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53012.exe33⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37356.exe34⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54468.exe35⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51100.exe36⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42076.exe37⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34588.exe38⤵PID:3168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18932.exe39⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12979.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12979.exe40⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17780.exe41⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10291.exe42⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2803.exe43⤵PID:2332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59316.exe44⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64116.exe45⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7523.exe46⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35.exe47⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59620.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59620.exe48⤵PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 72448⤵
- Program crash
PID:1512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 74047⤵
- Program crash
PID:3764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 74446⤵
- Program crash
PID:1236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 72445⤵
- Program crash
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 72444⤵
- Program crash
PID:2812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3460 -s 72443⤵
- Program crash
PID:5012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 74442⤵
- Program crash
PID:1452
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 74441⤵
- Program crash
PID:3428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 74440⤵
- Program crash
PID:3944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 72439⤵
- Program crash
PID:968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 72438⤵
- Program crash
PID:4724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 72437⤵
- Program crash
PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 72436⤵
- Program crash
PID:1768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4016 -s 72435⤵
- Program crash
PID:1412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 74434⤵
- Program crash
PID:5096
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 72433⤵
- Program crash
PID:468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 74432⤵
- Program crash
PID:3184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3296 -s 72431⤵
- Program crash
PID:3752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 74430⤵
- Program crash
PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 72429⤵
- Program crash
PID:4936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3124 -s 72428⤵
- Program crash
PID:4428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1072 -s 74427⤵
- Program crash
PID:1032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 72426⤵
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 612 -s 72425⤵
- Program crash
PID:4136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 74424⤵
- Program crash
PID:3508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 72423⤵
- Program crash
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4708 -s 72422⤵
- Program crash
PID:4692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 72421⤵
- Program crash
PID:2588
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 72420⤵
- Program crash
PID:1692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 74019⤵
- Program crash
PID:920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 72418⤵
- Program crash
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 74417⤵
- Program crash
PID:1156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 72416⤵
- Program crash
PID:1268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 74415⤵
- Program crash
PID:4052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4536 -s 72414⤵
- Program crash
PID:1236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 74413⤵
- Program crash
PID:3632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 72412⤵
- Program crash
PID:4956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 728 -s 74411⤵
- Program crash
PID:4532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 72410⤵
- Program crash
PID:216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 7449⤵
- Program crash
PID:3292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 7448⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 7087⤵
- Program crash
PID:2056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1412 -s 7086⤵
- Program crash
PID:3628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 7445⤵
- Program crash
PID:1636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 7444⤵
- Program crash
PID:1384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 7443⤵
- Program crash
PID:3972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 7242⤵
- Program crash
PID:5116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1900 -ip 19001⤵PID:408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2768 -ip 27681⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3800 -ip 38001⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 364 -ip 3641⤵PID:3728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1412 -ip 14121⤵PID:4016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1768 -ip 17681⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2968 -ip 29681⤵PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 540 -ip 5401⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3768 -ip 37681⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 728 -ip 7281⤵PID:1884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3008 -ip 30081⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1744 -ip 17441⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4536 -ip 45361⤵PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4972 -ip 49721⤵PID:3896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4636 -ip 46361⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 772 -ip 7721⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2896 -ip 28961⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1636 -ip 16361⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3192 -ip 31921⤵PID:3588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4780 -ip 47801⤵PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4708 -ip 47081⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2968 -ip 29681⤵PID:1644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4196 -ip 41961⤵PID:32
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 612 -ip 6121⤵PID:4532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4404 -ip 44041⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1072 -ip 10721⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3124 -ip 31241⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2864 -ip 28641⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1532 -ip 15321⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 3296 -ip 32961⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3972 -ip 39721⤵PID:1328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1384 -ip 13841⤵PID:1920
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 632 -ip 6321⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4016 -ip 40161⤵PID:2640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2220 -ip 22201⤵PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3192 -ip 31921⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1616 -ip 16161⤵PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3168 -ip 31681⤵PID:216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2560 -ip 25601⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3880 -ip 38801⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2180 -ip 21801⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3460 -ip 34601⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2332 -ip 23321⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1588 -ip 15881⤵PID:3004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1060 -ip 10601⤵PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2104 -ip 21041⤵PID:1168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4864 -ip 48641⤵PID:2840
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5166d7d3b1b6a76d8c58ed0a92021377e
SHA167ed72a8d72124b01b11cffaac59483ab33a7c07
SHA256221ae41d4d8a56b8eee3ab5d58af6d0f67215ca6bb1bf635f82ef7e4d7aa89ea
SHA5126a20882e3fb45da2bb4be686f74ad2ebbd730974ab41708c49aa9bbcebab8466f32ba3c94b999aee5ecbb41109305235a4653b0a05dc8f71d64b251e1b8076ca
-
Filesize
128KB
MD5e70ebb7b322e063980d27c8178a0154f
SHA10e60cc80a4a0d05ca930b110a47238cdc10f84fb
SHA256a8958b8f462d420d62cb19c4e0e322749a7ad9a9e88810acbd71f10da72558c4
SHA512d4cb121f1fdbf26031cf8975f2b86d04efc4038aff168920dedc9de92e7a105cb2010a3a6e68b3345d7988e6afa3c49f96c8e222bf9ffa010af3008c3d779a34
-
Filesize
128KB
MD5f3969dcad14dc57605379262859fdbaa
SHA13e119713c04b098b48ddc1eed774e592da18e5c9
SHA256678e3f4ea4bc27e9a4af510197edf838030fba98a91889bcb7be4ab864f7ee39
SHA51249f98afb057f95a0db6b1f9dad527bbb0656d91be50e1d76b8866f8bba6dc8863bd35f07135463c0367730dd73ede6b7cd3c4b9a8f9b0cb5518f1ec6df37ca65
-
Filesize
184KB
MD5016052c3d938336aad9b35e781259f8a
SHA1538f0789e6ffc4c16a44b0cea467d3beae92bac7
SHA2566035f4fbf0b7e8827fe8067038686c1ff8e5e19460d6dc16fd6b7230cddb2868
SHA512dd6c04803e6682d480e8ef10aa26de04d213c2147e0bc05353399848c88127e66b2f6a9b282ff3aee43aab8068d00c9c060c43b79f632c755f902e8da90bc9c1
-
Filesize
184KB
MD5d68d193be7048353ae81d02a194834bf
SHA1f08c21762516d22f82516a938b8a21f2f568d147
SHA256415bc1e80c0e25e5bbdf3f9d3f6fac4e7ee477f42fb1b4f15d79005455de4682
SHA5127bae971f1b69a2f59d48b412014c5e495fad7a51a5183b8e06dfdb804f6620aa24260e56d5890ce01677f65e8c91f29a45a96f1410bd7550a465148236a546e7
-
Filesize
128KB
MD5ffc9b2c5745281245ffcbee937d299ce
SHA1ede6554e10cbe7142554c3ba1553e11bb790ac12
SHA2564af10c11da16f14ceef9cbefe87431c9cd5d51bf790686b156e1ecbb6efee26b
SHA5129a13819d6b6a6d56468f110ecabdcef876b752699a7ae1be57111b463ba426c2719b36f9c2c9f288cb4fc36187d07a43764a26313fc1d581e5afc97e9982d1ef
-
Filesize
184KB
MD53d1369e19f28e04405a08bad31d818bf
SHA1c1b9f0b4faf00a0226f7963a3ceba8cf85888893
SHA2566abbae037e89bdf78899be2a7b7467b2a59c2b433c6645972537c69f496505e2
SHA512a68ecbb5eb867500ef6328d350841a2ea0b60bd82376f19247d277e7f83c4034db40fc6d7ff5acb0d04a1b969c7e954b2f9b1ebe4b93bc288eff575f0ad8582b
-
Filesize
128KB
MD500a411b7fa3cddb72e2ea09cdec60802
SHA1a171ea3ce3d2976f4e9c9d609fbdcc9146ec1845
SHA256749d38b88dfa161c9a14b2db971604f664d0db16b18816ab28f086581b5c5cb4
SHA512bba3763c10e4b53eb12c9ab9057603c75d97afdaf839ddef92cdb912c9b1acbb77210bc5e695f974568065166a5cfdbdcdc551b622210426bf74122200621f71
-
Filesize
184KB
MD520086845c3776d36a832ab304e34a3c6
SHA1572f34f1d5409e8b7a78bf047a38b104088e8d8b
SHA256bcc9a369d791d1aee9f5dceee1929d8c02cf255c656306b0513157d044e67f3a
SHA51223afe8a79286e66bb6322a1f12a018603589d05b35b88363e95b4ade59624dd907ace118e9629738c7f55d30143cc0d9ff558246f65efb3df3d81cf522aecf5a
-
Filesize
184KB
MD5dabc57be65f0bb39eb034d6dab5420ad
SHA1158fe41eff3182c1847ba85d4aef9e13712ddc06
SHA2561f1266698b08490c1fbb2f9852b96ca8075ad43c86a9293055ac32b12034bdfd
SHA512c2220dcfb185273df295031070941921d6938eb7c2071ad549fa300432a4b4114495609d152ae2be8aee6cefc584f3879d3c1eb8ec54e6a1d7dfa24eb21d03fe
-
Filesize
184KB
MD503643a19c5982be7f8f5647b150dfa82
SHA19d67e8d11d0b8545fb87a8fac6e07b90d76f4d30
SHA25604dab39b55ba8a31bf5e6999b09e5437a2d36500f284931a381878e65ffcd0b6
SHA51263e097ec0e5c8de2f87a50b9d4b6bf31d6395a1d45953a402796898cab41234ef541e5b752af2356d2ca7840cbab55b4c574611c9f673b72c94c864430764b70
-
Filesize
184KB
MD525a67df94e97870542ddbb40a03b477b
SHA1757779e6bb1c7f895255df6381e0a9c94e619a6c
SHA256794daf32d864499c9dca41c77c1578dbacf2b935ce7f22ce4a505ccf89b2a1c9
SHA512d02a4e48a3861dc62cd9de2ad3d901abf71541aab087431634c17276386b86c009058fecd11d00af5d27c16c57ef1c7aefee8904e4575a4b71e1d46f931bc1b5
-
Filesize
184KB
MD5de42f9ec9a83d051c0ea7905915be72e
SHA1ae8baa068aba12d9436de532c33ecc933a8b6fef
SHA2565fad4c09acb02c60cee2b3b7d807aa7525a63de1ec68fd9a91957f6fc16cf6cc
SHA51290425aed833e4d2d8c2630c4dd7379128a10db1e3af55620cd96371311a05345c5049630522128a082bc7eb8e61abd6a12b2fc7aa94123a73a8e220ce8d52fbb
-
Filesize
184KB
MD58012253f259d6e701f9fdc9e2fb62fe9
SHA1eaf6e4950f9c0554ab040f219028e1e019ad047a
SHA256a348c413fac2679ee20e556de653d6edd48d14a59140d30ebeb7648b2dff2ef9
SHA512bc7fc534dd0d0f7013f67c30fd3393bbc05075ee63689e74ccfebb909d38a5948f48e97e6db341d1db6b32edf566fd867a3b25b87d68f42e25cc5bc2b71e74fd
-
Filesize
128KB
MD5500705cc94d47981370e4a0c65a1ae19
SHA163e64c7233ff39a19a386605dbad188439dd9eca
SHA256f0c7da719e936e8d904c4786b13f9ddc754e067f73e06d8d94114c1b11c64576
SHA512b16224563cb287bb3dab36ccd830fa2d1c578889fbe7e5b9554e19a7956001e7cb9e5d02b4e12329022dc0fe83278e2cef4162f402ea412a72a49dab576ecb02
-
Filesize
184KB
MD53f0d489a17fffdc3a0cfde7e04db4ff4
SHA1b0d370f15fe95555d04bb1f53be1f2f42eabfcd3
SHA256753a4871413cb64afd16fd772b9b1238f658e65a30405163a0f624396f351d8f
SHA5127711ce76d85729059611bde0797c8f11eab4b80c6f13a2e320a30335c4d27107fb050a6bf5e74dfea1fd95fd4d0e9ed5024fa168d7b1c1d61f21ba3b80d90b61
-
Filesize
184KB
MD56bbd5cfa52f94a68953c786f535fa265
SHA148062cf12dade2ca9d838f456416f1623ebb5b4e
SHA2567186fe845abb6cd55124fde5ccccc947332d37bec8bcf0db2b5125e4ac96dedf
SHA512ef5a403ec3e773c547c2c5e864c1c9ae6a1159eb35716b7ee49be724a3730d276be14a0fbc8a3bc82da9aeb5dcbb10e2af5f981fdb5b8bdf4e1df324d58680ad
-
Filesize
184KB
MD5be9b0b8f07346019b3f55d646976c53b
SHA110edc8c2e00c151bbd87a3e38bc5e9909225f6d5
SHA2562e339f3a5f9a9e9dec5832a70ba6d2ec5c7b21a93aed611d712b4c6c81693345
SHA512724fbe63e05f3c665b151347bff73349ceb1663b91702dc7f6345df45bd3fbc88022d51b7ca4afa2243e1d70d1046f49ed890612366b140b5110eddae425623d
-
Filesize
184KB
MD52ffdd0391fc4453b5bf4f40e39712501
SHA1dfe81da2968512e395e08cba769ae01c0dbf4b03
SHA256e7f24fef4d74ce694f905ced71a4304c8adbcf86cbdd5215709c5162e44be2f0
SHA5124253bd1f4a369f7890db058fc186358cd782bddbc879dc559a5280407e72da6f62ef61fa5753a7bcc2cbdf48d795d9e08826c13d49e26632e021ad9c4f68fe2a
-
Filesize
184KB
MD51f6f7c62e78875235ce15d3a7d3950ee
SHA18c48c9c50ee628feadaf09229255f6bcc672f505
SHA256eebea93d9347841cc79b3f8126f0b144aa76781f1042ab00b74361e5926aaf5d
SHA5128588d0375d0f871ed6e4230c3f2d1ffe8aa5b8303bd8e163fcf54bcb4eefb072ec0d6f4506015f40b94cef840cf54387a6be3daee09dff17c72c9f2ccf932e7a
-
Filesize
184KB
MD5a4f3dd5ed0c103cb0249cc09c2dd015e
SHA1f403155ffbf4a6e017e894d1961c0ddd3148aff1
SHA25643c57c0e277bbfb568b1680b96ca268ca7c3c08eacbab1b35f5c57a2df0e61b9
SHA5129f884c1cc66185593e03a54a7fa2c3b47a285ffc07dacc7ffd1d66f4162d13b4f2649d1aef774ad693903693d23476fe00a14ab77961f9941d80900eb5f77b39
-
Filesize
184KB
MD56efbfee2e0274ce6ff03223a4641fc2a
SHA159a6084fea66e6e34c2252955c8ed66abc7787cb
SHA2565a7df3dc03e2417a0577b33cc98b71f4acb2f1cf4d1a517b4c275757b71c694a
SHA512d0934d55be1889b56cedcf596b52c36c27a9537a0a5ae0d66d8a87e9199b875838eabb81e536c28d9aefc7a97fe48591fc1ec04fe243ccfdc82ad59d2452cc53
-
Filesize
184KB
MD55ec959c32f73eb4fa11e42a5992a51a4
SHA1f2ca89f8a8baddaa32621f3fa006b9ebc40058d4
SHA2565c2baaea1962c6aa31dc29f8eee25d99a189b9eebc346565b9c968c68a9c4132
SHA5129bd0c4fb162af5adba27580c95fdfb6a726ce01b11d46d0bde3987d7f165331d7d5187b1d1f5b120a31844602acfec4c4e42df2d15a18abf1cb7fe1fdacd871d
-
Filesize
184KB
MD51b174b3cdacaf9aed21306cbc2465c5f
SHA153fe46ddddc203c993c56d59ae2dfa323b33b2fe
SHA256f455bd60cf601c5d4309efb37a0718df27e4345855b948c331744053b8ec48d5
SHA51228b39ab8fa1c058427c67a3e7b6ec2bd09b397aa1f22084843a66e2f57a29ae8bf2deebd2a170cebe9938a7f07849a9847a8ad03cc46e39aab367be87760c5a6
-
Filesize
128KB
MD584173ae187d6fecaaeea8f7ff3c2c4ee
SHA16f7a445298aa576231697f994dddb0f0e3eaaffe
SHA256985b0731e330f738c1c79e663461853553c436aa09d69367a87f8b7de14ce0ac
SHA5127fe98403e096d7ba5ae8e26d01166137d71b3e16188f3d6c6bd0cff9ae3a616615ae98c40e6fb86eeb192f83f5e5d6a7398cefd2d52650ae05ed913fd6bbcda2
-
Filesize
184KB
MD5a65f403bc174994f96b96d7e7811168b
SHA1cae2cb157ff317a5267b4ee8655ac71532f83a80
SHA25619631234f0439067f4b27534670bf53d7924a18ca6ffc7545800a7c81808ddc2
SHA512255cae07c33ed5576b7918c7949558e7b23d0ea2536cd394e4e00e13644d89fbffab22e5cc230b671e3ad6a6c6481709760d621c4baacaefff6fbc9e065c07cf
-
Filesize
184KB
MD5bc260a56725854ec8208a4fdc6b32633
SHA1b5e4456784aa31da47428842e9e0ec9cd9b6043a
SHA256d728c0717a0b3aaa37639addb5140a03636d4b739162eb9e924daa4eb1d87e5c
SHA51299ddeb7d4bbb0219965505f9045eaa382c0179300491e9db1927d7e35bc8d554bd8f1ad2e9e66bf549446a1a6160fb9f908d1441ceccc8f0ea3165643691e5fd
-
Filesize
184KB
MD52c2b21668efe03f4882d86f2f4e4087b
SHA1b490cf6c18a67fe73971c4cc990be976c1259c97
SHA256aca96da59d763ae8417e2d3836db907fca087817adab20a30944fb51c6a2674e
SHA512cd719100da6ad822f7e85ef8688ed9390576f1d837c38090ff04846f8b1486b36acd33e9d890f44f406b437fd41f5ca1f92044ac8b6d9e1c8e276cdf1d268a73
-
Filesize
184KB
MD58e6436291380033447dcec20584480c2
SHA1e30d5cf83ab13458da90f7cf8a5ed6b9b09cf68d
SHA25609e1a0c323cefedfa9648e4854a93e09848db6aa2bd4ca6831e3b7485d21ff6c
SHA512d55bf5af2aca2d296329f06a779ecf621455523fc72045f5a0d044b2040e298d34083f645d6c563f85bda3c86353229df461d1da94108c3bfd4b2f859bdd1ae2
-
Filesize
184KB
MD5253f37a03499d9a437d64acd5de62f25
SHA1eb1622cf1caec0436bd7f2a087622ed5bd3e433f
SHA2563def20fdb3437e9c33264db89dc6d4283e0b3b9d6b57a751ca3af3d072bf20ce
SHA51213229e29f3be8bad8d9cb338c0c26abbe4d61727bbf0c07b9c54c8e5625f93f78d8b1df5d637fcc006c20797dd18914a0b4b99f70e9dbcf68b855ceb81164961
-
Filesize
184KB
MD5650e9bf5f79e88981bd0125171efd525
SHA1cd5edef1867ad72c7817bac8a64c135a67f83bac
SHA256c9d05461568f0bdbac8973c82badfdd7ff5007f26a4e1efb8b801833a3f0ea54
SHA512c5e31aa369328121f96e3007b5501bd317615778955fe398f9970b5da72c0e65eb9d7c478514525738f97bb50e7a42905dabc77e07a9e5ef1371e90da1e31359
-
Filesize
128KB
MD53d61cb8ba930e29e7e1edff39db383bd
SHA1fdd8ab060dde803b06dba2e007ddd71d9ae93220
SHA2569a5948285e2b8ef570f3cf98324496e45fa68640de03e4d98a902fe406673947
SHA512554aa5221698d6fc3eae61acde1ca1b751398b4bfdb5085f1f9b183622ef03da32d74e3984325694ee6294650f5badf604da0ab4c37817fc91be5f0003f1d6da
-
Filesize
184KB
MD502e5d6cb93d4c3d68d4c33cc9fc114d1
SHA16ee0ecfe17e56b8551c2d0a16bed4aeafbbda614
SHA2567f587109345e3a72283542c03c70daccbc3d82158ce5f0f5d5276f29953e867f
SHA51209bce05a059700ec572e2f263c04c610d2fdcb71f9e4141ee2ab56dc64082a999712517520dc5b9e56b9476c9f347de7a995066cd1eb9002f6646878015ed0bc