Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe
Resource
win10v2004-20240508-en
General
-
Target
240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe
-
Size
184KB
-
MD5
ae08bb2449fa2924148b4bf87925a617
-
SHA1
407078531c9ca1776bcb0fd81c84c3a7ca23a157
-
SHA256
240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07
-
SHA512
7424790a7ea65b4d8b5968d4daa4bd3dee396cafbfb18b02e3df53a424afd264564c2cc1fd94a7148ff578d082ae3fcc2decfb3fedc9b3798783f2fd7aa144c9
-
SSDEEP
3072:oIDAcXonKlipdXuwWqaFRnJpLlvnqntiuRn7:oIzohnXulRJpLlPqntiuR
Malware Config
Signatures
-
Executes dropped EXE 32 IoCs
pid Process 4988 Unicorn-38960.exe 4768 Unicorn-23584.exe 4660 Unicorn-8399.exe 4424 Unicorn-58560.exe 1788 Unicorn-31088.exe 4612 Unicorn-51290.exe 3904 Unicorn-36106.exe 3456 Unicorn-55540.exe 1484 Unicorn-5545.exe 2020 Unicorn-43418.exe 4036 Unicorn-28234.exe 3960 Unicorn-47668.exe 4836 Unicorn-1757.exe 412 Unicorn-21960.exe 1948 Unicorn-60024.exe 4944 Unicorn-44648.exe 4504 Unicorn-60190.exe 4908 Unicorn-44814.exe 4400 Unicorn-29630.exe 1264 Unicorn-1965.exe 1676 Unicorn-52318.exe 1504 Unicorn-37710.exe 5080 Unicorn-57336.exe 3608 Unicorn-11233.exe 1252 Unicorn-51244.exe 2512 Unicorn-36060.exe 2780 Unicorn-20684.exe 3360 Unicorn-5499.exe 4740 Unicorn-56428.exe 3144 Unicorn-61724.exe 3856 Unicorn-46348.exe 2620 Unicorn-437.exe -
Program crash 35 IoCs
pid pid_target Process procid_target 2272 1016 WerFault.exe 81 2188 4988 WerFault.exe 88 4608 4768 WerFault.exe 94 3968 4660 WerFault.exe 98 3548 4424 WerFault.exe 103 3600 1788 WerFault.exe 106 1552 4612 WerFault.exe 109 4352 3904 WerFault.exe 112 1692 3456 WerFault.exe 115 2828 1484 WerFault.exe 118 4500 2020 WerFault.exe 122 3472 4036 WerFault.exe 125 3088 3960 WerFault.exe 128 2992 4836 WerFault.exe 131 4272 412 WerFault.exe 134 872 1948 WerFault.exe 137 3480 4944 WerFault.exe 140 4320 4504 WerFault.exe 143 4596 4908 WerFault.exe 146 5040 4400 WerFault.exe 149 1724 1264 WerFault.exe 152 1736 1676 WerFault.exe 155 2828 1504 WerFault.exe 158 2196 5080 WerFault.exe 161 4220 3608 WerFault.exe 164 2864 1252 WerFault.exe 167 2720 2512 WerFault.exe 170 2364 2780 WerFault.exe 173 4864 3360 WerFault.exe 176 1948 4740 WerFault.exe 179 3988 3144 WerFault.exe 182 1196 3856 WerFault.exe 185 4868 2620 WerFault.exe 188 1400 2620 WerFault.exe 188 1444 2620 WerFault.exe 188 -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 1016 240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe 4988 Unicorn-38960.exe 4768 Unicorn-23584.exe 4660 Unicorn-8399.exe 4424 Unicorn-58560.exe 1788 Unicorn-31088.exe 4612 Unicorn-51290.exe 3904 Unicorn-36106.exe 3456 Unicorn-55540.exe 1484 Unicorn-5545.exe 2020 Unicorn-43418.exe 4036 Unicorn-28234.exe 3960 Unicorn-47668.exe 4836 Unicorn-1757.exe 412 Unicorn-21960.exe 1948 Unicorn-60024.exe 4944 Unicorn-44648.exe 4504 Unicorn-60190.exe 4908 Unicorn-44814.exe 4400 Unicorn-29630.exe 1264 Unicorn-1965.exe 1676 Unicorn-52318.exe 1504 Unicorn-37710.exe 5080 Unicorn-57336.exe 3608 Unicorn-11233.exe 1252 Unicorn-51244.exe 2512 Unicorn-36060.exe 2780 Unicorn-20684.exe 3360 Unicorn-5499.exe 4740 Unicorn-56428.exe 3144 Unicorn-61724.exe 3856 Unicorn-46348.exe 2620 Unicorn-437.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 4988 1016 240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe 88 PID 1016 wrote to memory of 4988 1016 240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe 88 PID 1016 wrote to memory of 4988 1016 240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe 88 PID 4988 wrote to memory of 4768 4988 Unicorn-38960.exe 94 PID 4988 wrote to memory of 4768 4988 Unicorn-38960.exe 94 PID 4988 wrote to memory of 4768 4988 Unicorn-38960.exe 94 PID 4768 wrote to memory of 4660 4768 Unicorn-23584.exe 98 PID 4768 wrote to memory of 4660 4768 Unicorn-23584.exe 98 PID 4768 wrote to memory of 4660 4768 Unicorn-23584.exe 98 PID 4660 wrote to memory of 4424 4660 Unicorn-8399.exe 103 PID 4660 wrote to memory of 4424 4660 Unicorn-8399.exe 103 PID 4660 wrote to memory of 4424 4660 Unicorn-8399.exe 103 PID 4424 wrote to memory of 1788 4424 Unicorn-58560.exe 106 PID 4424 wrote to memory of 1788 4424 Unicorn-58560.exe 106 PID 4424 wrote to memory of 1788 4424 Unicorn-58560.exe 106 PID 1788 wrote to memory of 4612 1788 Unicorn-31088.exe 109 PID 1788 wrote to memory of 4612 1788 Unicorn-31088.exe 109 PID 1788 wrote to memory of 4612 1788 Unicorn-31088.exe 109 PID 4612 wrote to memory of 3904 4612 Unicorn-51290.exe 112 PID 4612 wrote to memory of 3904 4612 Unicorn-51290.exe 112 PID 4612 wrote to memory of 3904 4612 Unicorn-51290.exe 112 PID 3904 wrote to memory of 3456 3904 Unicorn-36106.exe 115 PID 3904 wrote to memory of 3456 3904 Unicorn-36106.exe 115 PID 3904 wrote to memory of 3456 3904 Unicorn-36106.exe 115 PID 3456 wrote to memory of 1484 3456 Unicorn-55540.exe 118 PID 3456 wrote to memory of 1484 3456 Unicorn-55540.exe 118 PID 3456 wrote to memory of 1484 3456 Unicorn-55540.exe 118 PID 1484 wrote to memory of 2020 1484 Unicorn-5545.exe 122 PID 1484 wrote to memory of 2020 1484 Unicorn-5545.exe 122 PID 1484 wrote to memory of 2020 1484 Unicorn-5545.exe 122 PID 2020 wrote to memory of 4036 2020 Unicorn-43418.exe 125 PID 2020 wrote to memory of 4036 2020 Unicorn-43418.exe 125 PID 2020 wrote to memory of 4036 2020 Unicorn-43418.exe 125 PID 4036 wrote to memory of 3960 4036 Unicorn-28234.exe 128 PID 4036 wrote to memory of 3960 4036 Unicorn-28234.exe 128 PID 4036 wrote to memory of 3960 4036 Unicorn-28234.exe 128 PID 3960 wrote to memory of 4836 3960 Unicorn-47668.exe 131 PID 3960 wrote to memory of 4836 3960 Unicorn-47668.exe 131 PID 3960 wrote to memory of 4836 3960 Unicorn-47668.exe 131 PID 4836 wrote to memory of 412 4836 Unicorn-1757.exe 134 PID 4836 wrote to memory of 412 4836 Unicorn-1757.exe 134 PID 4836 wrote to memory of 412 4836 Unicorn-1757.exe 134 PID 412 wrote to memory of 1948 412 Unicorn-21960.exe 137 PID 412 wrote to memory of 1948 412 Unicorn-21960.exe 137 PID 412 wrote to memory of 1948 412 Unicorn-21960.exe 137 PID 1948 wrote to memory of 4944 1948 Unicorn-60024.exe 140 PID 1948 wrote to memory of 4944 1948 Unicorn-60024.exe 140 PID 1948 wrote to memory of 4944 1948 Unicorn-60024.exe 140 PID 4944 wrote to memory of 4504 4944 Unicorn-44648.exe 143 PID 4944 wrote to memory of 4504 4944 Unicorn-44648.exe 143 PID 4944 wrote to memory of 4504 4944 Unicorn-44648.exe 143 PID 4504 wrote to memory of 4908 4504 Unicorn-60190.exe 146 PID 4504 wrote to memory of 4908 4504 Unicorn-60190.exe 146 PID 4504 wrote to memory of 4908 4504 Unicorn-60190.exe 146 PID 4908 wrote to memory of 4400 4908 Unicorn-44814.exe 149 PID 4908 wrote to memory of 4400 4908 Unicorn-44814.exe 149 PID 4908 wrote to memory of 4400 4908 Unicorn-44814.exe 149 PID 4400 wrote to memory of 1264 4400 Unicorn-29630.exe 152 PID 4400 wrote to memory of 1264 4400 Unicorn-29630.exe 152 PID 4400 wrote to memory of 1264 4400 Unicorn-29630.exe 152 PID 1264 wrote to memory of 1676 1264 Unicorn-1965.exe 155 PID 1264 wrote to memory of 1676 1264 Unicorn-1965.exe 155 PID 1264 wrote to memory of 1676 1264 Unicorn-1965.exe 155 PID 1676 wrote to memory of 1504 1676 Unicorn-52318.exe 158
Processes
-
C:\Users\Admin\AppData\Local\Temp\240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe"C:\Users\Admin\AppData\Local\Temp\240cf78d46aa22b037c2ee4c6f232590e05598e5c767e2642310d1f4c3937f07.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38960.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23584.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8399.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58560.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31088.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51290.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36106.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55540.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5545.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43418.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28234.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1757.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44648.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60190.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44814.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29630.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29630.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1965.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52318.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52318.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37710.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57336.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11233.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51244.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36060.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20684.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5499.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56428.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61724.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46348.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-437.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 72034⤵
- Program crash
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 74034⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 74834⤵
- Program crash
PID:1444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 74433⤵
- Program crash
PID:1196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 75232⤵
- Program crash
PID:3988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 74431⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 71230⤵
- Program crash
PID:4864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 72429⤵
- Program crash
PID:2364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 72428⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 74427⤵
- Program crash
PID:2864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 74426⤵
- Program crash
PID:4220
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 72425⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 74424⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 72423⤵
- Program crash
PID:1736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 74422⤵
- Program crash
PID:1724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 74021⤵
- Program crash
PID:5040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 72420⤵
- Program crash
PID:4596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 72419⤵
- Program crash
PID:4320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 72418⤵
- Program crash
PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 72417⤵
- Program crash
PID:872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 74016⤵
- Program crash
PID:4272
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 72415⤵
- Program crash
PID:2992
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 75214⤵
- Program crash
PID:3088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 74413⤵
- Program crash
PID:3472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 74412⤵
- Program crash
PID:4500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 74411⤵
- Program crash
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 72410⤵
- Program crash
PID:1692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 7249⤵
- Program crash
PID:4352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 7448⤵
- Program crash
PID:1552
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 7247⤵
- Program crash
PID:3600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 7246⤵
- Program crash
PID:3548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 7245⤵
- Program crash
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 7444⤵
- Program crash
PID:4608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 7243⤵
- Program crash
PID:2188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 7242⤵
- Program crash
PID:2272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1016 -ip 10161⤵PID:1872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4988 -ip 49881⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4768 -ip 47681⤵PID:2780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4660 -ip 46601⤵PID:2468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4424 -ip 44241⤵PID:3452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1788 -ip 17881⤵PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4612 -ip 46121⤵PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3904 -ip 39041⤵PID:4548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3456 -ip 34561⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1484 -ip 14841⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2020 -ip 20201⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4036 -ip 40361⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3960 -ip 39601⤵PID:1080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4836 -ip 48361⤵PID:3876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 412 -ip 4121⤵PID:5000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1948 -ip 19481⤵PID:672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4944 -ip 49441⤵PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 4504 -ip 45041⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 4908 -ip 49081⤵PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4400 -ip 44001⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1264 -ip 12641⤵PID:1428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 1676 -ip 16761⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1504 -ip 15041⤵PID:1148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5080 -ip 50801⤵PID:1228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3608 -ip 36081⤵PID:1172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1252 -ip 12521⤵PID:4628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2512 -ip 25121⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 2780 -ip 27801⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 392 -p 3360 -ip 33601⤵PID:1720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4740 -ip 47401⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3144 -ip 31441⤵PID:1828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3856 -ip 38561⤵PID:3508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2620 -ip 26201⤵PID:3564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2620 -ip 26201⤵PID:3628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2620 -ip 26201⤵PID:4452
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5d5dadb710acc8560421eaa86e28e647d
SHA1c6c0e92b7499b5fb675d9367be12b61da9fff90a
SHA25631fb26ba5febfcf2a6cc916acd65ff7a6f00261424fd5165810bad3db5888f3e
SHA512f6007e13fd91c9b1ef356e50b8cc54cb0ec41330b1a629c36fc3162cdfed2a22f6737f0a4d40fad273f4d926bba1472f07aab87604074b29452967b5808975f8
-
Filesize
184KB
MD52bab3ccacf036cb9ec8b856e6ecbef7c
SHA1212be9b0bd88213e535f357a1b43facf04dc6ec1
SHA256b1e1fbbad8694eb95d81483f67183b536ef4fa69840bb3111b6164b122c723f8
SHA512184dc3f0299682f80e55b20b1bdf2b532f4e3dd1ee3ecf974fd1ea4fa78470fe24323e8c033f9013a0c30a46d759a8fafa632860c051e0e1a0652d02715aeee5
-
Filesize
184KB
MD55abe5ec8cdc10d4d0b1c1f9bb56d116d
SHA171bcc65131cd52720ec44f3f24c43b8f86fa006c
SHA25621c56059f5804fdef5618ac25e4657321b80de7a5bf95623d87c21b595dbdd14
SHA51225e5c8adde5c2442f2e4a1318eda909a5a4f4b65c519b6d088d0cf6796606f1f52c5424e8da441fdf63c5df0f49eb4ced53cbe0723b462abaa5f1b892ffd1d8c
-
Filesize
184KB
MD5f766de3637fe177843b7eb4a2063f6b6
SHA1cfed50d013dd838eb10a3a998a898e85b5a20e63
SHA256606dde60fc4d8b8262c04cdaa81ac6073025f68a95ea6f483f9e108e9f4cdfb8
SHA512411c1bb94b23921a65dbedd0b3e14ccf2f75ed7b30e64ea35c7a7d9df2fd261ee15a5d82081632baa19fcbe9a95831166d926d4cd9fd4e7b6e71a3f39f313a75
-
Filesize
184KB
MD569f635dab151a8888fce295a4e2bb126
SHA124fbd0f332dabb6b14c445f3ba9ee63fd98a8e20
SHA2567c8a19c004503a54d04731962d843da3e728b6f189c2e23a3e32bcf3c6f9016f
SHA512304ddf81688daa0271698f281e26ec17385a2ac43a21891b1c825773bcde5336a464263c4e92e0d3d00db5d54d6b79e1bf03e986c72722ae89eaa2715c651396
-
Filesize
184KB
MD55eb5c8dac9b8433a1e0a038069ca9536
SHA1d42e19d72b9dbbac71306a6d2c612b096ec03af2
SHA2561cc0b70b4f4e4f2bb463191d4183838eac300cecc9e92c24331490c8ad66d5d5
SHA51270f1e05283394fe69169aab1dbd6f6f2b4c307eca76454b20ec5a98ad9a55c7ae93e5405ed8ff0f46a0d834c59c1203f417950ac747af2e73879c5b250efc002
-
Filesize
184KB
MD58981f2688f767333adaedbfe2c5df7e8
SHA1377fba03e20cfc706033cbd04befbb446319632c
SHA2562732d304df834527b3c9dc789d85a472696cba8435276162f16ba3056e2e12a3
SHA5128ba12b893a9560fa1bef64cb1b538d0e8bb719782cd51207a71adf3a057a456b6bef6f179de652f26731990afe3357622aca306e324be4f6eefe28a604e26d76
-
Filesize
184KB
MD52b817e8526adea08e7ce374e34222cc9
SHA11f60997b21b27f88c3508487e22683fffac64d96
SHA256992a5f8964fa0b22a3f496a13e0579aee992d3b493cf8dada4aadeb4c330d30f
SHA51228f0e963d4d3655e3fb559845569d03424dbc3a2cfd73031a433c2ba5963fd5f626001835551510787558403dab71df98f28ab68f6570b5760f66cedd1469a9e
-
Filesize
184KB
MD5727429096f25765c39e9ae1c2930392b
SHA19e081463d72d1c163f4bf64e478cdc44d3c3a9ef
SHA256d6bc43e7ebd4b8105bc614f426fa281c3a9ac79b07480b338d3dadf78e6c6221
SHA5122046c578e781f096c9b0901d04f43b45a60785eb6cdb535305781673b6a3189d401c449b3433d53262b6787e87ae4af5f9a3ab853b78d76052b8efd1c766ad58
-
Filesize
184KB
MD580d85891ddc1ee1b3c1d0ffd77f0ac44
SHA137528aebc46b4680f2007c0145f2bc8a7bd3fb48
SHA256cdf992981f1c6538c25f8d4631e36af5caab8f36b38e58b1f0f64d5e1ee45390
SHA5127afeaecba5a655a4538627991a7b369ce64cdc17fdbe01412db8de022fc5520c2206559884ad9b5d3eea25b36137a3f64ce03cb4c8aa8dc4f88d9b31c9da1e25
-
Filesize
184KB
MD5558a0e222c6bae044da9c75b0933fbb4
SHA1a564e22f73cfa8e693810055c622b5b7f765b402
SHA256aa0187cc735cebca535604d3b215907bdf5c7b042defae34a9bce52b79e50c2a
SHA512a0763d08f5c60a7a1f43307976bdd7056742c4806519429f3c19128fd3864c2966e57d46d908dea24a8ad0a654af58dcbd75196b04ab59ce7386e306973c13cc
-
Filesize
184KB
MD5ac55e56596f7878e0370fa2e2cc8e955
SHA105aad1385e7a7d49a8f4c26147dfc761f0100deb
SHA25675e1cdc60f8a7cfc9149d791ca54cb2de665e0915827f19caf9d3c1b4b0db684
SHA512f350190538c7bb5cd1ddf7f305e25faabad731d629b27953b631fb97684d2c5a743a24a39d86724b866809d788f88352b9336839bc9ecaee77bc5896f36d8185
-
Filesize
184KB
MD5fa650f79a89a881a24a3ca0cc4fa7bbf
SHA11c7dcaf2bcce70d26b3f2cc00a05b3cd7e99356c
SHA2566903e693d2670a3632a785505a54d597c2ee925610243187fea73540034dcf7f
SHA512f3f272eebaa872f03578de6892f27f3625b9409ed6183f9808cb05b8cf14c7a7007a9c4649f38ca84cff05cbf4acb5ae04465890a5ab8e110ba22d64cbf2f0f4
-
Filesize
184KB
MD57c327215659d477c3f76af6aa2f49324
SHA19830efabb4806b1d779290a4883117183374f959
SHA256479c398fb79d14e829bf4fbcad3094ba70a003ec9507e4e287c89fce73e9af09
SHA5122f239668dffc883c6f9ea6fb0c3aac66ed6a1c501a5c34f1d57bbf1525c37fbb648a0e30a751cc222e64ceaf95bf67766aa49aa2a74759ba6bbdfebcf6aeaa06
-
Filesize
184KB
MD511fae76859c0c0b95e076dd5f912e1ab
SHA109cb9c3beee4e53541e261b6e3a15d5e63e19fe1
SHA256a35f0d5e9e5f01cec7ea79e66919e172d32cf4cb96cdfc840c46e4c2a95ad672
SHA51246785653132cf63c42bdd7fa74b6714c7f8d20064f76bac669832123a7427c484455f43f15c146f8d2e3bee79803c03a39261654cf14757747f369c2def80593
-
Filesize
184KB
MD5de73eeccbebbd0584167c634c5649dff
SHA1f6d1493565644d290c95d5deeb952b9b31597452
SHA256b95d281fcd619e81cf9377f97d231a3e4d15d4ee52f63ec34abdfdcd7e2fc9f2
SHA512d4f55206de05d055e85cdfc8a49076de949cfcd7652f6064342b6d32d1b6ff8cd5f1480959516e834b46230c30e8e6eab24a94bf8b61663c1e2c13edc08fd2bd
-
Filesize
184KB
MD5917c70a4d49f8f199b42e8f4c9d53077
SHA1aa302e7dd5a3a2ce892ba2d9810857f65f742c47
SHA2561c8ef0bab8b950a45e95706b7b6313f11ac62aea8f5165ce14770581e1a3b451
SHA512e2ed7805524e838759ccf281cff1ca6ec78c9e644bbc0a86fe4c7faf06447e41907195df91cb574f607749f742ff8bf866d75978af40e6c8971834aa61463f1a
-
Filesize
184KB
MD54ee6b3e0c3d3e41bf845dc9ab796629c
SHA1c3906ca166b36e044d9e6fc72de1f166f8947658
SHA256ffc5b9625b6e75d2ba9c889351a839022da4e5b274ac3f136a8ff23d7408caa3
SHA5126285a09f9f43f483f81f21ac40cfc6bb6e0a52aa669c445f7458b0e4bc3dc0ada7622c5434e05e519cbda2e09df947127b90132eac5fe3d033ea5913a105dbf3
-
Filesize
184KB
MD547f46d3de4c788fca2a6f00da0a428b4
SHA163c17476f7e00426f43ffcdda7aeae9fdee16ce9
SHA2568c368345ee18866b3e9f40ce774e3a19627a2e739093b4d7aec38bf677ff34a9
SHA512d8393927e1860f8f5090d5ec90b693eb2221d29f3671c9a789c26549e5519ed14dd97be9b3a2123ded6de4c9781fed6bb009b596d4de850a2b1793b0350ca77d
-
Filesize
184KB
MD56139a9f22d7dc3e24b6ccbbdc4f62021
SHA1c0b64b618b3cfddb9d4a6b9f9b84488ed7f2b222
SHA256252ec944759c9217426f9c133029040491c4d4aef7e6c0dccd2143c13d7a669c
SHA5120236586827df6a2b99f25cee3801f57acee4d3082c2d54986c3e0fb9635c4d8e1536799c6a41134522ba62a1daf73af3b4e3e3a6081f49449cf99a9181426f87
-
Filesize
184KB
MD5b429f4dd79c1ea393fc0065c3f937197
SHA19484d58c0790f75716611e559234c5684b244e6d
SHA2565f54ea87283f1e4f6395bcb4cfecbf1029e41e77bb2c612e0c25cb03199e7b98
SHA512108041b1e2ac9d0bfaa7d88693b5c9eb2b2f77a4ba40410f666120e9883fd9a62479a0d6e7310a0bbf330aa6c0720406e18a42d21e6efa23e0bef714474b5058
-
Filesize
184KB
MD5db194059071eb93c632923f3b0374ff7
SHA1c66c595f8865a1028cc92344638b798a9ea4bc00
SHA256824166d754034b81ea7a7cb4fd8d1b0d1019d5d4856f425e2000e0f0b522aa31
SHA512514f0c34be17c30dcf79fa153b3fa08025316ecd3db0d8c7fb15f140c83c82c2af6df49e0bc1695ca9fb7d7c4e2443cd9abee9f5d5f495977880e6122f392014
-
Filesize
184KB
MD5e560d25b107c2b8ede1fb32ded3f6017
SHA1a1c3b8c2de5658574f2b05ee45cd85320dfa0de0
SHA256e4db636cf109347a87eb4ae098441604246392d4cc26a4035b7a69ca966579b0
SHA5121d552306300c67426a08fdb7901d90931ed59b6774fa8271cf009055622570751efcbc155ef2c7495ce0d526e6da0a403af5fbea258e5b237c9728f8d7f01145
-
Filesize
184KB
MD5ab6ce4f7994d2aa006c58888ddc0574b
SHA12e0d533c43005923417cdb54e42ea237db35f3dd
SHA25641a8ad404b200ad64ba9e5bb31a081080ccdd130c5a301a1fb2ed24f92bce6d3
SHA5122002bfd378ff63a31d4efac2bb95f0651c8320d5c9130a6cbea92013df227816671c1971af0046f8daa10339c6db0eff1907dda06ff2f7118409cfac418206c2
-
Filesize
184KB
MD5ab8394d97d1f4012aa2de8ba27e403f4
SHA1fec550ac381aed37dad8f5be3b36aef33fbd4624
SHA256df231d73d97c08a1581a62f0eaf8ea956fc0e99cd4e3448151e9dc77627bdc61
SHA5123aa686f05d3debd51dd1abceae6200aa9e39912bec3b35fc3b0fa1d0a0ad39df90bd8c91800746fb8b474791bb3db7a4d4713655661a7dce41fc1b1974482f80
-
Filesize
184KB
MD5eacbf87d2c7c64df86a20d45284b5ebd
SHA16245bedee965aad4ecf8add9b9877e2ab4e900b5
SHA256832b70feafea70e34ffc4bd8e8075161e8030aa555ddf7a99e541d159a15adf5
SHA512d51c2b2a3e6bbe7853513f91b2cdcb0ae60c12ecc85abfaa54213e6617fc40e2c270ce34d8ac09c982d112080a58a4037177c3441b7d84aa8172b566a0e31f93
-
Filesize
184KB
MD5b8eecc9abdc55e127906d3c8c1e3f36c
SHA1adb30170f9a390c02e20abfd94646a3699e77ec5
SHA2562d6f25f0973177f93e7415c8ca786f0f09d910fb7009d32f67e953845708b79f
SHA51211eb8fa344ffd358ffec02c4d131bbf8046cba0b7e139bd38b3ae69ed8cd1751e64fd8c77bb4fd2b638a6872b5cf63bb8e61c9554987f783c4e4daacdff7a868
-
Filesize
184KB
MD56438896b5275d64c92e99a9a3c92cbe0
SHA11f797decf8c496fcf36e3a489aebc7fd2991b67d
SHA25682ff089bee97335e680c32ad2d00139df8fcfa8d7264c0bbff930954392afbb6
SHA5125a1079b9026e0cbd267f40858e1e88c22ca6b2ee04d5a632493d33e1ce265c9954e44b723e3c58052dfe1c1996d0b2cce4e14a5ea8eafb0d29b919bdd029f4c6
-
Filesize
184KB
MD58cc9bc7d4001907fc7661363165497f6
SHA1608323bf16a3bebc9c1130273b8f9f0afd477e8c
SHA25648f96cd2cdf4b3933f16ace6f3cd60e0a2ad9319540421756834d77247e39a3b
SHA512f611e035fd2d2876f9b16c38ce449ac3549e849ae4055014c1c90065a39505b0c361c52bba4005bb0f8ed74bb7ff51cb7b96b7e330f13266c6d3adf068a2f41c
-
Filesize
184KB
MD5e5b6c716f46f7a94564953899d0890a0
SHA13705b99a5a6b90476fc415555e7b9cb6449eb017
SHA2564a7abb30a9649be77f374c69120ed4f20daff8af87027d1b7b5d018501e06604
SHA512a1f8902c08221c4055acb6e0f01b9b1278c74535c2461d83cb861a9361666ac87378e26bed4b03134d160bbd92515aad60507675289da0ed69c25418dffe76c7
-
Filesize
184KB
MD5fd9bd76599c2d17ac16eb2e25ccb6f87
SHA16f8580897f957b20020285dfd7940fcf2cb82b93
SHA256732607f024f0029611aee38eb1b8daf5469cefc0541bb916cdf2cf239ca43c7a
SHA512f1bab785f5f9c386ceb72d4f2b7d565223488a9d63721f611abe06b409c7c807d4252f254c18bb143a078113323690e1d18d1776e285df186bd0ee67a59bae81
-
Filesize
184KB
MD54348eccff188003e9275618e9dfa4809
SHA1b3eae87f7a019f6a36a0dc47c1b4b19dfad84b9a
SHA25656dcd22def6e93c4ec6c6b46374c4fd8dc22f36299c3495682467a9ee5bf2b67
SHA512c70546e46b93fb282037c46357a8cee2cd458f1e87516dc9c2cf92a6bebe2d0f4d639472406bc20bc53bdab927ade30c063d44c15fd9279dd1d5b653ddc33c16